US5799200A - Power failure responsive apparatus and method having a shadow dram, a flash ROM, an auxiliary battery, and a controller - Google Patents

Power failure responsive apparatus and method having a shadow dram, a flash ROM, an auxiliary battery, and a controller Download PDF

Info

Publication number
US5799200A
US5799200A US08/536,519 US53651995A US5799200A US 5799200 A US5799200 A US 5799200A US 53651995 A US53651995 A US 53651995A US 5799200 A US5799200 A US 5799200A
Authority
US
United States
Prior art keywords
data
volatile
controller
flash rom
dram
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US08/536,519
Inventor
William A. Brant
Michael E. Nielson
Edde Tin-Shek Tang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
EMC Corp
Original Assignee
EMC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by EMC Corp filed Critical EMC Corp
Priority to US08/536,519 priority Critical patent/US5799200A/en
Assigned to EMC CORPORATION reassignment EMC CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BRANT, WILLIAM A., NIELSON, MICHAEL E., TANG, EDDE TIU-SHEK
Application granted granted Critical
Publication of US5799200A publication Critical patent/US5799200A/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/30Means for acting in the event of power-supply failure or interruption, e.g. power-supply fluctuations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1415Saving, restoring, recovering or retrying at system level
    • G06F11/1441Resetting or repowering

Definitions

  • the present invention relates to data processing systems and methods including arrangements for ensuring integrity of data manipulated thereby. More particularly, the present invention relates to data processing apparatus and processes which are adapted to prevent degradation of data handled by the system despite losses of primary electrical power sources. While not necessarily limited thereto, the present invention is especially useful for preserving digital data during a primary power outage and for retrieving it for further manipulation by computer apparatus and methods in configurations employing multiple data buses, multiple controllers, arrays of magnetic storage devices, and multiple dynamic random access memories.
  • Computer memory systems are generally classified as either volatile or non-volatile.
  • a volatile storage device depends upon continuous application of primary power from a source to maintain the information placed in it. For instance, a bistable circuit will switch between the zero state and the one state depending upon signals introduced to it, and will retain its last state as long as the power supply is coupled thereto. Even loss of that power for a short period means that its state upon reintroduction of power is meaningless.
  • non-volatile storage is not dependent upon continuous power application thereto to maintain the integrity of its data significance.
  • digital data stored as a function of particular magnetic orientations in a magnetic media is impervious to any continuity of power supply.
  • data stored on a magnetic disk, or magnetic tape does not change merely because power to the drive circuit which writes or reads that data is lost and regained. The data thus stored is recoverable despite intermittent presence of power for the circuitry associated with such a drive.
  • the characterization of such storage as non-volatile.
  • a Dynamic RAM (DRAM) type of memory is relatively fast operationally.
  • Another type of RAM is the Static RAM which likewise is relatively fast.
  • DRAM Dynamic RAM
  • Static RAM which likewise is relatively fast.
  • one version of a Static RAM can retrieve every word out anytime at 20 nano-seconds a piece.
  • the problem is a Static RAM costs five times as much as a DRAM, and they are not integrated to the same density as DRAM because of the addressing. That is, eight megabit Static Ram chips are currently available, whereas the state of the art for Dynamic Rams is 64 megabits.
  • the Static Ram cell takes more space.
  • Four megabytes of contemporary non-volatile RAM costs significantly less than a Static RAM
  • DRAM modules are preferred for many data processing systems. However, they utilize volatile memory elements, and thus demand some form of reliable backup system in the event electrical power from a main or primary power source for the system is lost.
  • Static RAM does not require the refresh control logic, but entails a prohibitive price despite having relatively low power requirements for data retention during power loss. In fact, it does not take much Static RAM cost before the user can afford UPS.
  • An object of the present invention is to provide a data processing system which enjoys the operational advantages of volatile memory devices having a relatively large memory capacity, but with the further advantages of non-volatile retention of data in response to power failures.
  • a single module containing both a DRAM and a Flash ROM works to automatically preserve data in the event electrical power is lost from a primary power source. Data is moved from the DRAM to the Flash ROM where it remains as long as power is not available from the primary source.
  • the aforementioned module is configured as a unit which is self-contained and potentially replaceable or transportable.
  • the data storage and recovery process is automatic and transparent to the other system controllers and processors. It appears to the associated controllers that the DRAM never lost its contents. At most, a small battery as an auxiliary power source is used which only is active long enough to move data from the DRAm to the Flash ROM.
  • Apparatus and processes in accordance with this invention are dedicated to the preservation of data contained in a system enabled by a primary electrical power source, and employing a Dynamic Random Access Memory (DRAM).
  • DRAM Dynamic Random Access Memory
  • the present invention advantageously utilizes a Flash ROM and a special purpose controller for this purpose.
  • the controller includes an arrangement for initializing the Flash ROM, as well as for performing a data preservation function.
  • the initializing arrangement responds to each initial application of power from the primary source to the system for applying an erase signal to the Flash ROM. This readies the Flash ROM for quick response to a power failure by completely clearing it.
  • the data preservation function is performed upon detecting loss of power from the primary power source. Thus, the power loss detection triggers a transfer of the data contained in the dynamic random access memory into the Flash ROM.
  • the controller Upon loss of power from the primary source, the controller causes the application of power from the auxiliary power source to the controller until the data transfer from the dynamic random access memory to Flash ROM is completed. In response to return of power from the primary source, the data is retrieved and returned from the Flash ROM to the dynamic random access memory.
  • the present invention is intended for use in conjunction with a data processing system having a plurality of controllers, each including an aforesaid data retrieving and returning arrangement.
  • controllers further include structure or steps for storing a signal indicating that the recovery of data from the Flash ROM to the dynamic random access memory was initiated by the associated controller. This prevents multiple controllers from attempting concurrent data retrieval.
  • the present invention relates to a method of preserving data contained in a system enabled by a primary electrical power source which system employs at least one DRAM unit.
  • This method includes the steps of clearing the contents of a Flash ROM, sensing that the primary power source is no longer supplying power to the system, and transferring the data contents present in the DRAM into the Flash ROM. Once it is recognized that the primary power source is again supplying power to the system, the method in accordance with the present invention includes the step of returning the data from the Flash ROM to the original DRAM.
  • This method can further include the step of utilizing an auxiliary power source for preserving the contents of the DRAM, and for actuating the Flash ROM during the transferring step.
  • the process can include a step of storing a signal indicating that the returning step was initiated. This stored signal is thus useful for preventing concurrent attempts to perform the data returning step.
  • FIG. 1 is an overall block diagram of a disk controller data processing system suitable for incorporating the present invention.
  • FIG. 2 is a circuit board mounting elements of the present invention.
  • FIG. 3 is a Flash ROM module showing the various input and output signal terminals associated therewith.
  • FIG. 4 is a flowchart of the Flash Module initialization process.
  • FIG. 5 is flowchart of the Flash Module operation.
  • FIG. 6 is made up of FIGS. 6A and 6B and is a flowchart of the write data recovery process in accordance with this invention.
  • FIG. 1 is an arrangement for controlling a multiplicity of disks in a manner transparent to a host system (not shown).
  • the FIG. 1 disk controller system uses a processor 10, which is in communication with two Peripheral Communication Interconnect (PCI) buses 11 and 12. These buses use a bus protocol common among personal computer environments. Many chips are plugged directly into these types of buses.
  • the PCI bus is not the processor bus or CPU bus, but rather another bus, such as a local bus.
  • the remote computer or host system
  • the remote computer is coupled through host interface devices 18A and 18B which are, in turn, connected to the PCI buses at terminals 19A and 19B.
  • the FIG. 1 system appears to the remote computer as a single, large capacity, disk storage device. Commands and data from the remote system are received by the interface devices 18A and 18B at terminals 19A and 19B which stores whatever is received in DRAM units 16 and 17 described below. Interface devices 18 then notify the processor 10 that these commands and/or data are stored. Processor 10 determines the functions required, and directs the various components in storing data received from the remote computer, as well as for collecting data to transmit outwardly at serial dump links 13A and 13B.
  • the system of FIG. 1 has dual, redundant Application Specific Integrated Circuit (or ASIC) modules 14 and 15, and a plurality of Small Computer System Interface (SCSI) devices 21-24 and 31-34, all of which are similarly coupled into buses 11 and 12.
  • ASIC Application Specific Integrated Circuit
  • SCSI Small Computer System Interface
  • the configurations of these buses are well known in the industry. They are sufficiently defined that many systems are configured with chips that plug directly onto them, or in some cases, the chips are positioned on boards and attached to the bus via wires.
  • a plurality of disks, such as 25-28 and 35-38, are coupled through the SCSI interface devices 25-28 and 35-38 into the buses 11 and 12.
  • the pair of ASIC modules 14 and 15 each functions as a controller in response to processor 10 for interfacing with a pair of redundantly coupled Dynamic Random Access Memory (DRAM) modules 16 and 17.
  • DRAM module 16 is active, and module 17 is a shadow data memory for ensuring reliability through redundant operations.
  • the two DRAMs are each configured as separate modules (note FIG. 2 for module 17) on boards arranged to cooperate with two memory buses into ASIC modules 14 and 15.
  • the system is redundant with the first DRAM 16, referred to as a DM for data memory and DRAM 17 as an SM for shadow memory.
  • the latter is thus a redundant memory that parallels the main, active DM unit which normally works directly with processor 10 and controller modules 14 and 15.
  • Module 16 When data is received from the remote host, one of the DRAM associated chips is assigned to act as the active host interface chip. Module 16 provides this function in FIG. 1. That board works into a Small Computer System Interface (SCSI) and/or the remote host interface device 18A coupled to terminal 19A. These couplings could take the form of a fiber optic interface into the remote host system, as well as into PCI buses 11 and/or 12.
  • SCSI Small Computer System Interface
  • remote host interface device 18A coupled to terminal 19A.
  • the received data is written into both DRAM 16 and 17 memories simultaneously. There is no degradation of performance because this writing is done in parallel.
  • the host is notified when the writing is finished with an acknowledgement.
  • Each ASIC module 14 and 15 associated with modules 16 and 17 has a serial connection 13A and 13B so that a serial dumping goes to the other module 14 or 15 which has exactly the same architecture.
  • the system has redundant controllers 14 and 15 which also have access to all the disks.
  • the connection between the controllers 14 and 15 is the two serial links and the SCSI buses.
  • the PCI buses 11 and 12 function independently in response to the controllers.
  • UPS Universal Power System
  • the original DRAM module is removed, and is replaced by module 17 which operates like the removed module as far as the system is concerned.
  • Module 17 includes the capability upon return of system power to present the original data for reloading into the associated DRAM.
  • a DRAM typically accessed through a single access transistor and a single capacitor, is a volatile storage, so it is necessary to continuously refresh it which requires introduction of multiplexed addresses.
  • the problem solved by the present invention is the preservation of the data memory contents in a DRAM utilized by a controller for data exchanges with a remote system despite loss of a primary power source.
  • the DRAM has to log a refresh cycle because the DRAM cells require periodic access to them to refresh their contents.
  • Static RAM does not require this refreshing, but, as mentioned previously herein, there is an unacceptable cost penalty for using the Static RAM.
  • FIG. 2 shows the shadow DRAM module 17 including the active DRAM 51, an auxiliary power source in the form of a battery 52, controller 54, and the Flash ROM 55.
  • This assembly is a unit which is pluggable as an element of the system where the elements all interface amongst themselves.
  • the Flash ROM/DRAM Module 17 replaces the shadow DRAM module on the controller board.
  • the module 17 has both the DRAM 51 and Flash ROM 55.
  • This module is also compatible with industry standards. That is, it is constructable to appear just like an industry standard DRAM module.
  • Module 17 shown in FIG. 2 in accordance with the present invention advantageously utilizes Dynamic RAM fabricated into a relatively tiny module that appears nonvolatile to the system.
  • the contents of the DRAM 51 are continuously refreshed, as long as power from the primary source is available.
  • a battery 52 is included as part of the module 17 to control the logic 54 and other circuitry to transfer the DRAM 51 memory contents into the Flash ROM 55 upon loss of primary power.
  • the Flash ROM 55 is a non-volatile RAM or electrically erasable PROM with appropriate densities.
  • Flash ROM is applied to the device in reference to its erase mode. It is necessary to erase it before it is possible to write into it. However, once data is written into a Flash ROM, it remains there without the need for refreshing or application of continuous power. Flash ROMs are erased entirely with one operation. It has cycle times that are on the order of 80 to 120 nano-seconds per access in the present state of the art. A Flash ROM does not have the life span of a DRAM or other memory devices, so is not generally acceptable for continuous use, such as in place of a DRAM in the presently disclosed system. Also, a Flash ROM is considerably slower than a DRAM. However, a Flash ROM is capable of hundreds of thousands of cycles between failures which is satisfactory for the backup function it provides in conjunction with the present invention. Flash ROMs are generally conventional, and there is information available about them in the industry.
  • the FIG. 2 module 17 appears similar to a contemporary Dynamic RAM module, such as module 16. It includes a DRAM 51, but also has a small local controller 54 and a Flash ROM 55 having an amount of storage comparable with DRAM 51.
  • the module 17 is roughly the same form factor as the DRAM module 16. As far as the system is concerned operationally, it is the same as a contemporary DRAM module 16.
  • transparent to the host processors is the fact that module 17 includes a small auxiliary power source which is battery 52. It only needs enough battery 52 power to allow it, when it detects a power loss in its memory, to keep the DRAM 51 alive just long enough to transfer the data from the DRAM 51 to the Flash ROM 55.
  • the processor 10 sees module 17 of FIGS. 1 and 2 like a DRAM, but it has a nonvolatile nature to it. This obtains the benefits of speed and the density of DRAM, but in a non-volatile functioning mode. It is transparent to the remote processor, and relieves the system of concern about the case where power fluctuates.
  • the system essentially parallels the second DRAM 51 which is the shadow DRAM with the Flash ROM 55.
  • the module 17 operates as the shadow DRAM but should there be a power failure, the DRAM data is moved to Flash ROM 55 where it is held until power is restored. More expensive and volume demanding backup systems, such as the UPS power backup for the system, is then not required to provide "fast write” capability.
  • the module is controlled through available control and sense signals from processor 10, and the system ASIC units 14 and 15.
  • the flash module 17 is controlled through existing outputs from system processor 10. Sense signals are read through the DM and SM bits into the processor 10. The controls are set up such that, when the data is surveyed, it is possible to determine that it was recovered, that meaningful data exists, and that the download is complete. The user might also want to make sure that this data is marked as stale after it was returned to DRAM 51. This is illustrated in the flowcharts in FIGS. 4, 5 and 6.
  • a dump from the DRAM 51 to the Flash ROM 55 is effected.
  • an erase on Flash ROM 55 is previously performed during initialization upon Power On Reset (PON).
  • PON Power On Reset
  • the Begin function is accompanied by clearing three stored bits; namely, Last Save OK, DRAM Ready and Flash Ready.
  • the Last Save OK is cleared in preparation for receiving an indication that the last data save sequence was performed satisfactorily when it does occur.
  • the DRAM Ready indicating that DRAM 51 is ready to receive data, while the Flash Ready bit similarly reflects that the Flash ROM 55 is ready for data storage.
  • Local controller 54 stores a "Save OK" bit on the Flash ROM 55 when it determines that a successful dump of the contents of DRAM 51 into Flash ROM 55 occurred. As seen in FIG. 5, the first thing that local controller 54 does is to check to see if the Save OK bit is set reflecting that data was previously saved in the Flash ROM 55 suitable for recovery. If so, the Last Save OK bit is set, and the system proceeds to read the Flash ROM 55 data into DRAM 51 and to set the DRAM Ready bit. In addition, the DRAM Ready bit is set.
  • the controller 54 for module 17 additionally includes the ability to turn the auxiliary battery 52 off, and inspects for a Battery Enable command in this regard.
  • Battery 52 is only used as long as absolutely necessary at two times. The first is upon initialization to flash the Flash ROM 55. The second is when primary power is lost, at which time battery 52 is employed to save the data. Immediately thereafter, the battery 52 is turned off so as to avoid draining it.
  • Flash ROM 55 is erased, the battery 52 is turned off, and the Flash Ready bit is set, the local controller 54 enters a wait state, as reflected in the right side of FIG. 5. As soon as power is lost, controller 54 transfers the DRAM 51 data to the Flash ROM 55, along with the setting of the Save OK bit and the battery relay is cleared. The system then returns to the Begin step once power on is again detected.
  • Battery 52 of module 17 is potentially replaceable and/or rechargeable during normal system power application.
  • the first step is to turn the battery 52 on and wait until it is charged. It is then used to perform a flash erase which is followed by generation of an indication that the Flash ROM 55 is ready.
  • the erase cycle is neither instantaneous, nor is it normally completed in a single cycle.
  • Controller A and Controller B are the ASIC modules 14 and 15.
  • the battery 52 is initially turned on and allowed to charge off the main power source.
  • battery 52 is checked for full charge and, when it is as is indicated by BAT CHG from the battery circuit, then the Erase sequence is performed initializing clearance of Flash ROM 55.
  • DRAM 51 is enabled to perform its normal data exchanging functions as the shadow RAM.
  • This initializing has prepared the Flash ROM 55 for writing into the Flash ROM 55 whatever was in the shadow DRAM 51 upon subsequent power failure.
  • a unique sequence number is written that appears in the DRAM 51, as well as on disk 58. Finally, fast writing is enabled.
  • FIG. 4 depicts the initialization process which includes the placing of a sequence number on the disk 58.
  • the sequence number is written only by one controller 14 or 15 during initialization. Thereafter, this unique sequence number resides in both the Flash ROM 55, and on the disk 58 which is readable by both controllers 14 and 15.
  • the reason for the sequence number writing is so that, if power returns and the DRAM 51 content is restored, the software knows if it has recovered this data previously. The way the software determines this is by checking the unique sequence number stored with the data in the memory and on the disk 58. It is preferable not to lose synchronization and restore the same write data twice by accident. Because it is stored on a disk that both controllers can see, this provides the ability to verify data recovery. That is, if one of controllers 14 and 15 is actuated and restores the data, the other controller when it is actuated can determine that the sequence numbers in DRAM 51 and on disk 58 do not match thereby reflecting that the first mentioned controller already restored the data. Accordingly, one but not both controllers will restore the data.
  • controllers can boot the system, but one is likely to boot faster than the other for one reason or another. That controller recovers its local data, writes that to the disk and then it also checks to see if it should write the data that requires recovery from the other controller. If so, it pulls in the write data that has to be recovered and restores it. In the meantime, the other controller finishes its boot and examines its local RAM. It finds it has write data, and the way it finds out that data was recovered already or not is by checking the sequence numbers.
  • the controller determines from the sequence number that data was already recovered, then the controller does not do anything. Conceivably, one controller could boot so slowly that the other controller not only recovered the data, but now has accepted new host write data. In this case, it is important to prevent the first controller from recovering data by writing over what is even newer data.
  • the write sequence determines which one of the two controllers will become the master controller for the current recovery process. One of them will predominate, the other will not. Because the disks are common, it is possible to use a common stored sequence number that is in both the recovered DRAM and the disk 58. If they do not match, the controller recognizes that the system was already recovered.
  • fast writes is with regard to the concept that, because the controller has the data stored in two places, it is acceptable to acknowledge the write command before it is actually on a disk so it is referred to as a fast acknowledge.
  • FIG. 6 write data recovery process is initiated after primary power is restored.
  • controller A is ASIC module 14
  • controller B is ASIC module 15.
  • FIG. 6 is the process that the controllers 14 and 15 follow as opposed to the process that the module follows during normal power-up operations as presented in FIG. 5. Accordingly, FIGS. 4 and 6 show the way the controllers 14 and 15 operate, and how the modules are used in their operational environment.
  • controllers 14 and 15 are now starting at the Begin block and the recovery process is instituted. There is an initial indicator from the RAM that the software checks to make sure the DRAM is ready. In a typical system, the controller boots during the Begin block which takes sufficient time that the DRAM is always ready. But there is an indicator to make sure that the nonvolatile RAM 55 content has all been transferred to DRAM 51, and that it is ready to operate.
  • the local DRAM number is read and compared with the sequence number from disk 58 to see if they match. For purposes of an example, consider the operation of controller 14 in this regard. If it determines the sequence numbers match, then a recovery is initiated by controller 14. If they do not match, then the data was already recovered by controller 15 and controller 14, thus informed, can end its recovery process. Controller 15 has arrived at that point first so it has recovered its local data and now is prepared to handle exchanges of data with the remote host.
  • controller 15 If controller 15 has not finished booting to a point where it can communicate with other elements, then controller 14 assumes controller 15 is dead so it is necessary to perform the recovery. This operation is part of the interlock. First the local data is recovered, then the sequence numbers are changed, and then controller 14 writes a "no data number" to DRAM and disk 58. The controller next reads the remote DRAM number and the disk number. They are compared and a conclusion reached either that data was recovered already, or that recovery is needed.
  • the first thing done is to recover the local data followed by writing a "no data number" to DRAM and disk 58 so the sequence numbers are changed.
  • controller 15 When controller 15 is active, it will determine that this data was already recovered. So now if the controller reads the sequence number from the remote DRAM, it will reread it from the disk and perform a compare. If they are not the same, then the remote data was already recovered, and the controller does not have any more to do.
  • controller 14 can change the sequence number on the disk and on the controller 14 local memory, but it cannot change it in the memory on the other board.
  • controller will change the sequence number on the disk which means then the sequence numbers will no longer match.
  • the controller cannot accept the host write commands until it has recovered the data and the sequence numbers are changed. At that point, it is guaranteed that no other controller will recover the data.
  • the controllers cannot communicate with each other, but at the point they are able to communicate with the disk, they are likewise enabled to communicate with each other.
  • All signals connected to the Flash Module 55 shown in FIG. 3 are software readable from the system processor.
  • the following is a table describing the input and output signals for that module.
  • the Flash Module plugs into a memory module connector on the controller, and appears as DRAM. If the Flash ROM is erased and the battery is turned on, the Flash Ready signal becomes asserted. PON Reset and Flash Ready assertion causes the Flash Module to switch from controller power to battery power while deasserting DRAM Ready, deasserting Flash Ready, and storing the DRAM contents into Flash ROM. The Flash Module then turns itself off. When system power is restored and there was a save done when the power failed, the Flash Module asserts Last Save OK, reloads the DRAM from the Flash ROM and then asserts DRAM Ready.
  • the Flash Module is initialized by erasing the Flash ROM and enabling the battery.
  • the battery enable and the erase control signals come from processor 10, and are interlocked such that both cannot be asserted at the same time.
  • a sequence number is written to both the system configuration region on disk, as well as the Flash Module DRAM. This number is checked during controller boot to determine if the data in the Flash Module was recovered. If the number in the Flash Module DRAM matches the number on disk, the data requires recovery. If the numbers differ, then the data does not need recovering. When a controller does recover data, it must update the sequence number on the disk to a "no data" number on disk.
  • FIG. 3 shows a typical Flash ROM module with the input and output signals correlated with the signals presented in the flowcharts.
  • the Erase signal is the command to erase the module which occurs in the FIG. 4 flowchart in the initialization steps.
  • the battery enable (BAT ENABLE) signal turns the battery on.
  • the PON input signal is the Power On Reset for notifying the Flash Module that power is present, and is associated with the Begin element of the flowcharts.
  • the Last Save OK and Bat OK signals are produced by the Flash Module 17 after Power On Reset input (VCC LOCAL PON RESET) occurs which is after the module has read the location out of the Flash ROM 55.
  • Flash ROM 55 has an indicator which is stored reflecting that the save was completed so that all the data is secure.
  • the controller upon power on reads that signal, and then indicates to the system that the last save was successfully completed. That way, the system knows there is data to recover. It is an on-chip signal that is generated when everything that was in DRAM 51 is now safely in the Flash ROM 55.
  • the controller for module 17 checks the Flash ROM 55 to decide how to set the DRAM READY output bit on power on. During the recovery, the controller checks the Last Save OK line, and then writes the data that is in the Flash ROM 55 to the DRAM 51, thereby setting the output DRAM READY to a one level. The controller checks the LAST SAVE OK which also is set to a one level.
  • the FLASH PRESENT terminals shown in FIG. 3, is merely an arrangement for allowing the processor 10 and/or the controllers 14 and 15 to perform an inventory test to determine whether or not a Flash ROM module is in place, or if a stand-alone shadow DRAM is present.
  • a jumper between the two terminals to ground the FLASH PRESENT output could indicate that the standard shadow DRAM is present, and the absence of such a jumper might reflect that a Flash Module is present (or vice versa) to a sensing controller, processor or remote device.
  • module 17 In the initial state on PON, the four output signals from the Flash Module 17 are all set to the true state.
  • Module 17 is self contained, and employs a process which takes place automatically in a structure that enjoys significant cost savings while utilizing a low power, inexpensive battery 52. That is, module 17 is self contained with the advantages that the system board does not have to incorporate all the subsystems and components on it that would take space away from the DRAM module.
  • a non-volatile back-up RAM is provided.
  • the process is automatic with the control sequence logic 54 built directly on module 17.
  • the cost savings are an advantage over alternatives, such as by using an expensive Static Ram to obtain the same result. All that is required is a short term, auxiliary power source, such as a battery with enough power to complete the save process. Usually, about seventy-two hours is considered as a minimal amount of time to preserve the data, but, with the present invention, the data preservation is virtually indefinite.
  • the indefinite data storage because it is a non-volatile RAM, could survive being completely unplugged. It is possible to remove it from a system that suffered a totally catastrophic failure. Potentially, the user could take the controller out, take this module out and recover the data through another mechanism, such as putting on a new controller.

Abstract

Data in a system having dynamic random access memories (DRAM's) is preserved despite loss of the primary source of electrical power to that system. A Flash RAM and a small auxiliary power source are employed by a controller independent of the system to transfer the DRAM contents to the Flash RAM immediately upon loss of primary system power. The data is also automatically returned to the DRAM after return of primary power with special data signals or sequences being utilized in a multiple controller environment so as to award the complete data recovery function to the first controller to demand attention.

Description

BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to data processing systems and methods including arrangements for ensuring integrity of data manipulated thereby. More particularly, the present invention relates to data processing apparatus and processes which are adapted to prevent degradation of data handled by the system despite losses of primary electrical power sources. While not necessarily limited thereto, the present invention is especially useful for preserving digital data during a primary power outage and for retrieving it for further manipulation by computer apparatus and methods in configurations employing multiple data buses, multiple controllers, arrays of magnetic storage devices, and multiple dynamic random access memories.
2. Description of the Related Art
Computer memory systems are generally classified as either volatile or non-volatile. A volatile storage device depends upon continuous application of primary power from a source to maintain the information placed in it. For instance, a bistable circuit will switch between the zero state and the one state depending upon signals introduced to it, and will retain its last state as long as the power supply is coupled thereto. Even loss of that power for a short period means that its state upon reintroduction of power is meaningless.
Conversely, non-volatile storage is not dependent upon continuous power application thereto to maintain the integrity of its data significance. For instance, digital data stored as a function of particular magnetic orientations in a magnetic media is impervious to any continuity of power supply. Thus, data stored on a magnetic disk, or magnetic tape, does not change merely because power to the drive circuit which writes or reads that data is lost and regained. The data thus stored is recoverable despite intermittent presence of power for the circuitry associated with such a drive. Hence, the characterization of such storage as non-volatile.
The increased reliance of the data processing industry on integrated circuits with their attendant speed has increased the susceptibility of such systems to data loss or degradation because of primary electrical power loss or fluctuations. The elements associated with performing logical and mathematical functions on data have historically relied upon volatile circuitry for this purpose. The industry for many years has endeavored to improve the reliability of the power sources used, as well as to develop so-called "soft fail" systems. The soft fail approach depends upon the system recognizing early that power loss is imminent, and to utilize the remaining residual of power to transfer critical data from volatile storage into nonvolatile storage where it is recoverable when power is again present and stabilized.
A Dynamic RAM (DRAM) type of memory is relatively fast operationally. Another type of RAM is the Static RAM which likewise is relatively fast. For example, one version of a Static RAM can retrieve every word out anytime at 20 nano-seconds a piece. The problem is a Static RAM costs five times as much as a DRAM, and they are not integrated to the same density as DRAM because of the addressing. That is, eight megabit Static Ram chips are currently available, whereas the state of the art for Dynamic Rams is 64 megabits. The Static Ram cell takes more space. Four megabytes of contemporary non-volatile RAM costs significantly less than a Static RAM
Thus, DRAM modules are preferred for many data processing systems. However, they utilize volatile memory elements, and thus demand some form of reliable backup system in the event electrical power from a main or primary power source for the system is lost. Static RAM does not require the refresh control logic, but entails a prohibitive price despite having relatively low power requirements for data retention during power loss. In fact, it does not take much Static RAM cost before the user can afford UPS.
SUMMARY OF THE INVENTION
An object of the present invention is to provide a data processing system which enjoys the operational advantages of volatile memory devices having a relatively large memory capacity, but with the further advantages of non-volatile retention of data in response to power failures. A single module containing both a DRAM and a Flash ROM works to automatically preserve data in the event electrical power is lost from a primary power source. Data is moved from the DRAM to the Flash ROM where it remains as long as power is not available from the primary source.
The aforementioned module is configured as a unit which is self-contained and potentially replaceable or transportable. The data storage and recovery process is automatic and transparent to the other system controllers and processors. It appears to the associated controllers that the DRAM never lost its contents. At most, a small battery as an auxiliary power source is used which only is active long enough to move data from the DRAm to the Flash ROM.
Apparatus and processes in accordance with this invention are dedicated to the preservation of data contained in a system enabled by a primary electrical power source, and employing a Dynamic Random Access Memory (DRAM). The present invention advantageously utilizes a Flash ROM and a special purpose controller for this purpose.
The controller includes an arrangement for initializing the Flash ROM, as well as for performing a data preservation function. The initializing arrangement responds to each initial application of power from the primary source to the system for applying an erase signal to the Flash ROM. This readies the Flash ROM for quick response to a power failure by completely clearing it. The data preservation function is performed upon detecting loss of power from the primary power source. Thus, the power loss detection triggers a transfer of the data contained in the dynamic random access memory into the Flash ROM.
It is preferred to render the system insensitive to the primary power source to include an auxiliary power source such as a battery. Upon loss of power from the primary source, the controller causes the application of power from the auxiliary power source to the controller until the data transfer from the dynamic random access memory to Flash ROM is completed. In response to return of power from the primary source, the data is retrieved and returned from the Flash ROM to the dynamic random access memory.
The present invention is intended for use in conjunction with a data processing system having a plurality of controllers, each including an aforesaid data retrieving and returning arrangement. Each of these controllers further include structure or steps for storing a signal indicating that the recovery of data from the Flash ROM to the dynamic random access memory was initiated by the associated controller. This prevents multiple controllers from attempting concurrent data retrieval.
The present invention relates to a method of preserving data contained in a system enabled by a primary electrical power source which system employs at least one DRAM unit. This method includes the steps of clearing the contents of a Flash ROM, sensing that the primary power source is no longer supplying power to the system, and transferring the data contents present in the DRAM into the Flash ROM. Once it is recognized that the primary power source is again supplying power to the system, the method in accordance with the present invention includes the step of returning the data from the Flash ROM to the original DRAM.
This method can further include the step of utilizing an auxiliary power source for preserving the contents of the DRAM, and for actuating the Flash ROM during the transferring step. To prevent duplicate attempts to return the data to the DRAM, the process can include a step of storing a signal indicating that the returning step was initiated. This stored signal is thus useful for preventing concurrent attempts to perform the data returning step.
Those having normal skill in the art will recognize the foregoing and other objects, features, advantages and applications of the present invention from the following more detailed description of the preferred embodiments as illustrated in the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is an overall block diagram of a disk controller data processing system suitable for incorporating the present invention.
FIG. 2 is a circuit board mounting elements of the present invention.
FIG. 3 is a Flash ROM module showing the various input and output signal terminals associated therewith.
FIG. 4 is a flowchart of the Flash Module initialization process.
FIG. 5 is flowchart of the Flash Module operation.
FIG. 6 is made up of FIGS. 6A and 6B and is a flowchart of the write data recovery process in accordance with this invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
The problem resolved by the present invention relates to data integrity preservation in conjunction with a data processing system employing DRAM modules as volatile memory elements. One example of such a system is shown in FIG. 1 which is an arrangement for controlling a multiplicity of disks in a manner transparent to a host system (not shown). The FIG. 1 disk controller system uses a processor 10, which is in communication with two Peripheral Communication Interconnect (PCI) buses 11 and 12. These buses use a bus protocol common among personal computer environments. Many chips are plugged directly into these types of buses. The PCI bus is not the processor bus or CPU bus, but rather another bus, such as a local bus.
The remote computer, or host system, is coupled through host interface devices 18A and 18B which are, in turn, connected to the PCI buses at terminals 19A and 19B. The FIG. 1 system appears to the remote computer as a single, large capacity, disk storage device. Commands and data from the remote system are received by the interface devices 18A and 18B at terminals 19A and 19B which stores whatever is received in DRAM units 16 and 17 described below. Interface devices 18 then notify the processor 10 that these commands and/or data are stored. Processor 10 determines the functions required, and directs the various components in storing data received from the remote computer, as well as for collecting data to transmit outwardly at serial dump links 13A and 13B.
The system of FIG. 1 has dual, redundant Application Specific Integrated Circuit (or ASIC) modules 14 and 15, and a plurality of Small Computer System Interface (SCSI) devices 21-24 and 31-34, all of which are similarly coupled into buses 11 and 12. The configurations of these buses are well known in the industry. They are sufficiently defined that many systems are configured with chips that plug directly onto them, or in some cases, the chips are positioned on boards and attached to the bus via wires. A plurality of disks, such as 25-28 and 35-38, are coupled through the SCSI interface devices 25-28 and 35-38 into the buses 11 and 12.
The pair of ASIC modules 14 and 15 each functions as a controller in response to processor 10 for interfacing with a pair of redundantly coupled Dynamic Random Access Memory (DRAM) modules 16 and 17. DRAM module 16 is active, and module 17 is a shadow data memory for ensuring reliability through redundant operations. The two DRAMs are each configured as separate modules (note FIG. 2 for module 17) on boards arranged to cooperate with two memory buses into ASIC modules 14 and 15. The system is redundant with the first DRAM 16, referred to as a DM for data memory and DRAM 17 as an SM for shadow memory. The latter is thus a redundant memory that parallels the main, active DM unit which normally works directly with processor 10 and controller modules 14 and 15.
When data is received from the remote host, one of the DRAM associated chips is assigned to act as the active host interface chip. Module 16 provides this function in FIG. 1. That board works into a Small Computer System Interface (SCSI) and/or the remote host interface device 18A coupled to terminal 19A. These couplings could take the form of a fiber optic interface into the remote host system, as well as into PCI buses 11 and/or 12.
The received data is written into both DRAM 16 and 17 memories simultaneously. There is no degradation of performance because this writing is done in parallel. The host is notified when the writing is finished with an acknowledgement.
Each ASIC module 14 and 15 associated with modules 16 and 17 has a serial connection 13A and 13B so that a serial dumping goes to the other module 14 or 15 which has exactly the same architecture. The system has redundant controllers 14 and 15 which also have access to all the disks. The connection between the controllers 14 and 15 is the two serial links and the SCSI buses. The PCI buses 11 and 12 function independently in response to the controllers.
The systems have redundant power (not shown) and have the power system split out in different ways to render system operation continuous even if one power supply fails. The problem arises when AC power is lost to the whole system. A prior approach to overcome this event is by powering the system by a Universal Power System (UPS). This is not attractive for lower end systems, where space and/or expense are critical. UPS is a fairly expensive option.
It is important for such lower end systems that lost power to the entire system does not result in loss of the data. In accordance with the present invention, the original DRAM module is removed, and is replaced by module 17 which operates like the removed module as far as the system is concerned. Module 17 includes the capability upon return of system power to present the original data for reloading into the associated DRAM. A DRAM, typically accessed through a single access transistor and a single capacitor, is a volatile storage, so it is necessary to continuously refresh it which requires introduction of multiplexed addresses.
As mentioned, the problem solved by the present invention is the preservation of the data memory contents in a DRAM utilized by a controller for data exchanges with a remote system despite loss of a primary power source. The DRAM has to log a refresh cycle because the DRAM cells require periodic access to them to refresh their contents. Static RAM does not require this refreshing, but, as mentioned previously herein, there is an unacceptable cost penalty for using the Static RAM.
FIG. 2 shows the shadow DRAM module 17 including the active DRAM 51, an auxiliary power source in the form of a battery 52, controller 54, and the Flash ROM 55. This assembly is a unit which is pluggable as an element of the system where the elements all interface amongst themselves. The Flash ROM/DRAM Module 17 replaces the shadow DRAM module on the controller board. The module 17 has both the DRAM 51 and Flash ROM 55. This module is also compatible with industry standards. That is, it is constructable to appear just like an industry standard DRAM module.
Module 17 shown in FIG. 2 in accordance with the present invention advantageously utilizes Dynamic RAM fabricated into a relatively tiny module that appears nonvolatile to the system. The contents of the DRAM 51 are continuously refreshed, as long as power from the primary source is available. To enable data recovery, a battery 52 is included as part of the module 17 to control the logic 54 and other circuitry to transfer the DRAM 51 memory contents into the Flash ROM 55 upon loss of primary power. The Flash ROM 55 is a non-volatile RAM or electrically erasable PROM with appropriate densities.
The term Flash ROM is applied to the device in reference to its erase mode. It is necessary to erase it before it is possible to write into it. However, once data is written into a Flash ROM, it remains there without the need for refreshing or application of continuous power. Flash ROMs are erased entirely with one operation. It has cycle times that are on the order of 80 to 120 nano-seconds per access in the present state of the art. A Flash ROM does not have the life span of a DRAM or other memory devices, so is not generally acceptable for continuous use, such as in place of a DRAM in the presently disclosed system. Also, a Flash ROM is considerably slower than a DRAM. However, a Flash ROM is capable of hundreds of thousands of cycles between failures which is satisfactory for the backup function it provides in conjunction with the present invention. Flash ROMs are generally conventional, and there is information available about them in the industry.
The FIG. 2 module 17 appears similar to a contemporary Dynamic RAM module, such as module 16. It includes a DRAM 51, but also has a small local controller 54 and a Flash ROM 55 having an amount of storage comparable with DRAM 51. The module 17 is roughly the same form factor as the DRAM module 16. As far as the system is concerned operationally, it is the same as a contemporary DRAM module 16. Likewise, transparent to the host processors is the fact that module 17 includes a small auxiliary power source which is battery 52. It only needs enough battery 52 power to allow it, when it detects a power loss in its memory, to keep the DRAM 51 alive just long enough to transfer the data from the DRAM 51 to the Flash ROM 55.
Thus, the processor 10 sees module 17 of FIGS. 1 and 2 like a DRAM, but it has a nonvolatile nature to it. This obtains the benefits of speed and the density of DRAM, but in a non-volatile functioning mode. It is transparent to the remote processor, and relieves the system of concern about the case where power fluctuates.
The system essentially parallels the second DRAM 51 which is the shadow DRAM with the Flash ROM 55. Normally, the module 17 operates as the shadow DRAM but should there be a power failure, the DRAM data is moved to Flash ROM 55 where it is held until power is restored. More expensive and volume demanding backup systems, such as the UPS power backup for the system, is then not required to provide "fast write" capability. The module is controlled through available control and sense signals from processor 10, and the system ASIC units 14 and 15.
The flash module 17 is controlled through existing outputs from system processor 10. Sense signals are read through the DM and SM bits into the processor 10. The controls are set up such that, when the data is surveyed, it is possible to determine that it was recovered, that meaningful data exists, and that the download is complete. The user might also want to make sure that this data is marked as stale after it was returned to DRAM 51. This is illustrated in the flowcharts in FIGS. 4, 5 and 6.
Upon a power failure, a dump from the DRAM 51 to the Flash ROM 55 is effected. To prepare for this operation, an erase on Flash ROM 55 is previously performed during initialization upon Power On Reset (PON). As shown in FIG. 5, the Begin function is accompanied by clearing three stored bits; namely, Last Save OK, DRAM Ready and Flash Ready. The Last Save OK is cleared in preparation for receiving an indication that the last data save sequence was performed satisfactorily when it does occur. The DRAM Ready indicating that DRAM 51 is ready to receive data, while the Flash Ready bit similarly reflects that the Flash ROM 55 is ready for data storage.
Local controller 54 stores a "Save OK" bit on the Flash ROM 55 when it determines that a successful dump of the contents of DRAM 51 into Flash ROM 55 occurred. As seen in FIG. 5, the first thing that local controller 54 does is to check to see if the Save OK bit is set reflecting that data was previously saved in the Flash ROM 55 suitable for recovery. If so, the Last Save OK bit is set, and the system proceeds to read the Flash ROM 55 data into DRAM 51 and to set the DRAM Ready bit. In addition, the DRAM Ready bit is set.
If the data was not saved so that the Save OK bit is not set in the Flash ROM, then the system recognizes that two points of failure have occurred, and it is not possible to recover valid data. Such an event might occur if both the primary and auxiliary power source failed concurrently. There are various responses possible to such a condition, but they are beyond the scope of this application.
After data is recovered from Flash ROM 55 to DRAM 51, local controller 54, pursuant to the FIG. 5 process, inspects to see if controllers 10, 14 or 15 have generated an Erase command. If so, the Flash ROM 55 is erased and ready to receive new data. The Last Save OK bit is also cleared at this point.
The controller 54 for module 17 additionally includes the ability to turn the auxiliary battery 52 off, and inspects for a Battery Enable command in this regard. Battery 52 is only used as long as absolutely necessary at two times. The first is upon initialization to flash the Flash ROM 55. The second is when primary power is lost, at which time battery 52 is employed to save the data. Immediately thereafter, the battery 52 is turned off so as to avoid draining it.
After Flash ROM 55 is erased, the battery 52 is turned off, and the Flash Ready bit is set, the local controller 54 enters a wait state, as reflected in the right side of FIG. 5. As soon as power is lost, controller 54 transfers the DRAM 51 data to the Flash ROM 55, along with the setting of the Save OK bit and the battery relay is cleared. The system then returns to the Begin step once power on is again detected.
Battery 52 of module 17 is potentially replaceable and/or rechargeable during normal system power application. The first step is to turn the battery 52 on and wait until it is charged. It is then used to perform a flash erase which is followed by generation of an indication that the Flash ROM 55 is ready. The erase cycle is neither instantaneous, nor is it normally completed in a single cycle.
In the initializing sequence of FIG. 4, Controller A and Controller B are the ASIC modules 14 and 15. The battery 52 is initially turned on and allowed to charge off the main power source. Next, battery 52 is checked for full charge and, when it is as is indicated by BAT CHG from the battery circuit, then the Erase sequence is performed initializing clearance of Flash ROM 55. Thereafter, DRAM 51 is enabled to perform its normal data exchanging functions as the shadow RAM. This initializing has prepared the Flash ROM 55 for writing into the Flash ROM 55 whatever was in the shadow DRAM 51 upon subsequent power failure. During the initialization, a unique sequence number is written that appears in the DRAM 51, as well as on disk 58. Finally, fast writing is enabled.
FIG. 4 depicts the initialization process which includes the placing of a sequence number on the disk 58. The sequence number is written only by one controller 14 or 15 during initialization. Thereafter, this unique sequence number resides in both the Flash ROM 55, and on the disk 58 which is readable by both controllers 14 and 15.
The reason for the sequence number writing is so that, if power returns and the DRAM 51 content is restored, the software knows if it has recovered this data previously. The way the software determines this is by checking the unique sequence number stored with the data in the memory and on the disk 58. It is preferable not to lose synchronization and restore the same write data twice by accident. Because it is stored on a disk that both controllers can see, this provides the ability to verify data recovery. That is, if one of controllers 14 and 15 is actuated and restores the data, the other controller when it is actuated can determine that the sequence numbers in DRAM 51 and on disk 58 do not match thereby reflecting that the first mentioned controller already restored the data. Accordingly, one but not both controllers will restore the data.
It is possible both controllers can boot the system, but one is likely to boot faster than the other for one reason or another. That controller recovers its local data, writes that to the disk and then it also checks to see if it should write the data that requires recovery from the other controller. If so, it pulls in the write data that has to be recovered and restores it. In the meantime, the other controller finishes its boot and examines its local RAM. It finds it has write data, and the way it finds out that data was recovered already or not is by checking the sequence numbers.
If the controller determines from the sequence number that data was already recovered, then the controller does not do anything. Conceivably, one controller could boot so slowly that the other controller not only recovered the data, but now has accepted new host write data. In this case, it is important to prevent the first controller from recovering data by writing over what is even newer data.
In effect, the write sequence determines which one of the two controllers will become the master controller for the current recovery process. One of them will predominate, the other will not. Because the disks are common, it is possible to use a common stored sequence number that is in both the recovered DRAM and the disk 58. If they do not match, the controller recognizes that the system was already recovered.
The reference to fast writes is with regard to the concept that, because the controller has the data stored in two places, it is acceptable to acknowledge the write command before it is actually on a disk so it is referred to as a fast acknowledge.
Upon the occurrence of a power failure, the FIG. 6 write data recovery process is initiated after primary power is restored. Once again, controller A is ASIC module 14, while controller B is ASIC module 15. At the Begin block, power from the primary power source has returned, and FIG. 6 is the process that the controllers 14 and 15 follow as opposed to the process that the module follows during normal power-up operations as presented in FIG. 5. Accordingly, FIGS. 4 and 6 show the way the controllers 14 and 15 operate, and how the modules are used in their operational environment.
Assume that the system has operated for awhile so that there is data in the DRAM of module 16, as well as in DRAM 51 at which point the power fails but has returned. Both controllers 14 and 15 are now starting at the Begin block and the recovery process is instituted. There is an initial indicator from the RAM that the software checks to make sure the DRAM is ready. In a typical system, the controller boots during the Begin block which takes sufficient time that the DRAM is always ready. But there is an indicator to make sure that the nonvolatile RAM 55 content has all been transferred to DRAM 51, and that it is ready to operate.
The local DRAM number, or sequence number, is read and compared with the sequence number from disk 58 to see if they match. For purposes of an example, consider the operation of controller 14 in this regard. If it determines the sequence numbers match, then a recovery is initiated by controller 14. If they do not match, then the data was already recovered by controller 15 and controller 14, thus informed, can end its recovery process. Controller 15 has arrived at that point first so it has recovered its local data and now is prepared to handle exchanges of data with the remote host.
If controller 15 has not finished booting to a point where it can communicate with other elements, then controller 14 assumes controller 15 is dead so it is necessary to perform the recovery. This operation is part of the interlock. First the local data is recovered, then the sequence numbers are changed, and then controller 14 writes a "no data number" to DRAM and disk 58. The controller next reads the remote DRAM number and the disk number. They are compared and a conclusion reached either that data was recovered already, or that recovery is needed.
Thus, the first thing done is to recover the local data followed by writing a "no data number" to DRAM and disk 58 so the sequence numbers are changed. When controller 15 is active, it will determine that this data was already recovered. So now if the controller reads the sequence number from the remote DRAM, it will reread it from the disk and perform a compare. If they are not the same, then the remote data was already recovered, and the controller does not have any more to do.
Conversely, if the sequence numbers are the same, the controller recovers the remote data, and then changes the sequence numbers on the disk. Now controller 14 can change the sequence number on the disk and on the controller 14 local memory, but it cannot change it in the memory on the other board. When the data is recovered from the other memory, the controller will change the sequence number on the disk which means then the sequence numbers will no longer match.
The controller cannot accept the host write commands until it has recovered the data and the sequence numbers are changed. At that point, it is guaranteed that no other controller will recover the data. At the Begin point, the controllers cannot communicate with each other, but at the point they are able to communicate with the disk, they are likewise enabled to communicate with each other.
When a controller is ready to recover remote data, this function should not proceed if the remote data is not accepting post write commands because the other controller is already in the process of doing the same recovery. A semaphore is set on the disk to indicate that the other controller is recovering the data so the first controller will not proceed with the recovery. If another power cycle is performed, then both controllers know that those semaphores are incorrect and it is necessary to start over.
All signals connected to the Flash Module 55 shown in FIG. 3 are software readable from the system processor. The following is a table describing the input and output signals for that module.
______________________________________                                    
Signal Name                                                               
           from/to      Description                                       
______________________________________                                    
Batt.sub.-- CHG                                                           
           battery circuit                                                
                        Indicates the battery is                          
                        charged and ready.                                
batt.sub.-- OK                                                            
           ASIC controller                                                
                        Battery is present and                            
                        charged.                                          
batt.sub.-- enable                                                        
           ASIC controller                                                
                        Pulsed control to enable                          
                        the module to run on                              
                        battery.                                          
Erase      ASIC controller                                                
                        Pulsed input to start an                          
                        erase cycle of the flash                          
                        memory.                                           
PON Reset  processor 10 Controller Power ON signal                        
                        that forces board reset                           
                        when primary power is low.                        
                        This signal initiates a                           
                        store to flash operation                          
                        when Flash Ready is also                          
                        asserted.                                         
Last Save OK                                                              
           ASIC controller                                                
                        Indicates that the last                           
                        save operation completed                          
                        successfully.                                     
DRAM Ready ASIC controller                                                
                        When asserted, the DRAM is                        
                        available for use by the                          
                        controller.                                       
Flash Ready                                                               
           ASIC controller                                                
                        Flash ROM is erased and                           
                        the battery is "on."                              
Flash Present                                                             
           ASIC controller                                                
                        Jumper to indicate that                           
                        the shadow memory is a                            
                        flash module.                                     
______________________________________                                    
In summary, the Flash Module plugs into a memory module connector on the controller, and appears as DRAM. If the Flash ROM is erased and the battery is turned on, the Flash Ready signal becomes asserted. PON Reset and Flash Ready assertion causes the Flash Module to switch from controller power to battery power while deasserting DRAM Ready, deasserting Flash Ready, and storing the DRAM contents into Flash ROM. The Flash Module then turns itself off. When system power is restored and there was a save done when the power failed, the Flash Module asserts Last Save OK, reloads the DRAM from the Flash ROM and then asserts DRAM Ready.
The Flash Module is initialized by erasing the Flash ROM and enabling the battery. The battery enable and the erase control signals come from processor 10, and are interlocked such that both cannot be asserted at the same time. Before using the Flash Module to store write data, a sequence number is written to both the system configuration region on disk, as well as the Flash Module DRAM. This number is checked during controller boot to determine if the data in the Flash Module was recovered. If the number in the Flash Module DRAM matches the number on disk, the data requires recovery. If the numbers differ, then the data does not need recovering. When a controller does recover data, it must update the sequence number on the disk to a "no data" number on disk.
FIG. 3 shows a typical Flash ROM module with the input and output signals correlated with the signals presented in the flowcharts. Thus, the Erase signal is the command to erase the module which occurs in the FIG. 4 flowchart in the initialization steps. The battery enable (BAT ENABLE) signal turns the battery on. The PON input signal is the Power On Reset for notifying the Flash Module that power is present, and is associated with the Begin element of the flowcharts.
The Last Save OK and Bat OK signals are produced by the Flash Module 17 after Power On Reset input (VCC LOCAL PON RESET) occurs which is after the module has read the location out of the Flash ROM 55. Note that Flash ROM 55 has an indicator which is stored reflecting that the save was completed so that all the data is secure. Thus, the controller upon power on reads that signal, and then indicates to the system that the last save was successfully completed. That way, the system knows there is data to recover. It is an on-chip signal that is generated when everything that was in DRAM 51 is now safely in the Flash ROM 55.
The controller for module 17 checks the Flash ROM 55 to decide how to set the DRAM READY output bit on power on. During the recovery, the controller checks the Last Save OK line, and then writes the data that is in the Flash ROM 55 to the DRAM 51, thereby setting the output DRAM READY to a one level. The controller checks the LAST SAVE OK which also is set to a one level. The FLASH PRESENT terminals, shown in FIG. 3, is merely an arrangement for allowing the processor 10 and/or the controllers 14 and 15 to perform an inventory test to determine whether or not a Flash ROM module is in place, or if a stand-alone shadow DRAM is present. For instance, a jumper between the two terminals to ground the FLASH PRESENT output could indicate that the standard shadow DRAM is present, and the absence of such a jumper might reflect that a Flash Module is present (or vice versa) to a sensing controller, processor or remote device.
In the initial state on PON, the four output signals from the Flash Module 17 are all set to the true state. Module 17 is self contained, and employs a process which takes place automatically in a structure that enjoys significant cost savings while utilizing a low power, inexpensive battery 52. That is, module 17 is self contained with the advantages that the system board does not have to incorporate all the subsystems and components on it that would take space away from the DRAM module. With the present invention, a non-volatile back-up RAM is provided.
The process is automatic with the control sequence logic 54 built directly on module 17. The cost savings are an advantage over alternatives, such as by using an expensive Static Ram to obtain the same result. All that is required is a short term, auxiliary power source, such as a battery with enough power to complete the save process. Usually, about seventy-two hours is considered as a minimal amount of time to preserve the data, but, with the present invention, the data preservation is virtually indefinite.
The indefinite data storage, because it is a non-volatile RAM, could survive being completely unplugged. It is possible to remove it from a system that suffered a totally catastrophic failure. Potentially, the user could take the controller out, take this module out and recover the data through another mechanism, such as putting on a new controller.
While the exemplary preferred embodiments of the present invention are described herein with particularity, those having normal skill in the art will recognize various changes, modifications, additions and applications other than those specifically mentioned herein without departing from the spirit of this invention.

Claims (10)

What is claimed is:
1. Apparatus for preserving data that is stored in a volatile manner in a data processing system that is enabled by a primary electrical power source of a non-battery type that is subject to failure, said data processing system employing a first volatile dynamic random access memory for storing said data and a second volatile dynamic random access memory providing backup data storage for said data stored in said first volatile dynamic random access memory, comprising:
a non-volatile Flash ROM connectable to the data processing system;
a controller positioned together with said Flash ROM to be connectable to the data processing system together with connection of said Flash ROM to the data processing system including initializing means and data preservation means;
said initializing means responding to each initial application of power from the primary source to said data processing system for applying an erase signal to said Flash ROM for clearing said Flash ROM;
said data preservation means including loss of power detecting means for subsequently detecting loss of power from the primary power source;
said data preservation means including transferring means immediately responsive to said loss of power detecting means for transferring the data contained in said second dynamic random access memory into said Flash ROM;
an auxiliary battery power source positioned together with said Flash ROM and said controller; and
power applying means responsive to said loss of power detecting means for temporarily and immediately applying power from said auxiliary battery power source to said controller until such time as the data transfer from said second dynamic random access memory to said Flash ROM is completed.
2. Apparatus in accordance with claim 1 which includes power return sensing means responsive to return of power from the primary power source for returning data from said Flash ROM to said second dynamic random access memory.
3. Apparatus in accordance with claim 2 for use in conjunction with a data processing system having a plurality of controllers, each controller including a said power return sensing means, and each controller further including storing means for storing a signal indicating that said returning of data from said Flash ROM to said second dynamic random access memory was initiated by the associated said controller.
4. Apparatus in accordance with claim 3 wherein each said controller includes determining means for determining that a said signal was stored by said associated controller, said determining means operating to terminate said returning of data recovery from said Flash ROM to said second dynamic random access memory by an associated controller.
5. Apparatus for preserving data contained in a system enabled by a primary electrical power source of a type that is subject to periodic loss of power, said system employing a main volatile DRAM for exchanging data with a remote data processor and employing a volatile shadow DRAM for providing redundant backup for the main DRAM, comprising:
a non-volatile Flash ROM;
an auxiliary battery power source positioned to be carried together with said Flash ROM; and
a controller including initializing means and data preservation means positioned together with said Flash ROM and said auxiliary battery power source;
said initializing means responding to each initial application of power from the primary power source to the system for applying an erase signal to said Flash ROM for clearing said Flash ROM;
said data preservation means including detecting means for detecting loss of power from the primary power source, and temporary powering means powered by said auxiliary battery power source for responding to said detecting means for immediately transferring the data contained in the shadow DRAM into said Flash ROM, said temporary powering means remaining operative only until such time as the transfer of data from the shadow DRAM into said Flash ROM has been completed.
6. The method of preserving data that is contained in a data processing system that is enabled by a primary electrical power source of a type that is subject to failure, which system employs at least one volatile DRAM unit mounted at a mounting base, comprising the steps of:
providing a non-volatile Flash ROM at the mounting base;
providing an auxiliary battery power supply at the mounting base;
clearing the contents of said Flash ROM;
sensing that said primary power source is no longer supplying power to the system;
immediately transferring the data contents present in said DRAM into said Flash ROM upon sensing that said primary power is no longer supplying power to the system;
recognizing that said primary power source is again supplying power to the system;
returning the data from said Flash ROM to said DRAM; and
utilizing an auxiliary battery power source for transferring the contents of said DRAM into said Flash ROM only during a time interval of said transferring step.
7. The method in accordance with claim 6 which further includes the steps of;
storing a signal indicating that said data returning step was initiated,
determining that said signal has been previously stored, and
preventing a subsequent execution of said data returning step when it is determined that said signal has been previously stored.
8. Apparatus for preserving data that is stored in a volatile manner within a data processing system that is enabled by a primary electrical power source of a non-battery type that is subject to a loss of power, the data processing system employing a first volatile dynamic random access memory for storing data, the data processing system further employing a second volatile dynamic random access memory that provides backup data storage for the first volatile dynamic random access memory, and the second volatile dynamic random access memory being physically removable from the data processing system, said apparatus comprising:
a mounting base physically replacing the second volatile dynamic random access memory;
a third volatile dynamic random access memory mounted on said mounting base to be carried therewith;
said third volatile dynamic random access memory providing backup data storage for the first volatile dynamic random access memory;
a non-volatile Flash ROM mounted on said mounting base together with said third volatile dynamic random access memory to be carried with said mounting base;
a controller mounted on said mounting base together with said third volatile dynamic random access memory to be carried by said mounting base;
an auxiliary battery power source mounted on said mounting base together with said third volatile dynamic random access memory and said non-volatile, said auxiliary battery power source connected to selectively provide battery power to said controller, said controller including initializing means and data preservation means;
said controller initializing means responding to each initial application of power from the primary source to the data processing system for applying an erase signal to said non-volatile Flash ROM for clearing said non-volatile Flash ROM;
said controller data preservation means including loss of power detecting means for subsequently detecting loss of power from the primary power source;
said controller data preservation means including transferring means immediately responsive to said loss of power detecting means for transferring data contained in said third volatile dynamic random access memory into said non-volatile Flash ROM;
said controller data preservation means being responsive to said controller loss of power detecting means for temporarily and immediately applying power from said auxiliary battery power source to said controller until such time as data transfer from said third volatile dynamic random access memory to said non-volatile Flash ROM has been completed.
9. Apparatus for preserving data contained in a system that is enabled by a primary electrical power source of a type that is subject to periodic power loss, the system employing a first volatile-DRAM for exchanging data with a remote data processor, and the system employing a physically removable second volatile-DRAM for providing redundant data backup for the first volatile-DRAM, comprising:
a mounting base physically replacing the second volatile-DRAM;
a third volatile-DRAM mounted on said mounting base to be carried therewith, said third volatile-DRAM replacing the second volatile-DRAM as a redundant data backup for the first volatile-DRAM;
a non-volatile Flash ROM mounted on said mounting base together with said third volatile DRAM to be carried by said mounting base;
a controller mounted on said mounting base together with said third volatile DRAM and said controller;
an auxiliary battery power source mounted on said mounting base together with said third volatile DRAM, said non-volatile Flash ROM, and said controller;
initializing means within said controller;
data preservation means within said controller;
first means included said initializing means responding to each initial application of power from the primary power source to the system for applying an erase signal to said non-volatile Flash ROM for clearing said non-volatile Flash ROM;
second means including said data preservation means for detecting loss of power from the primary power source, and operating in response to a said detected loss of power from the primary power source to utilize said auxiliary battery power source to immediately transfer data contained in said third volatile-DRAM into said non-volatile Flash ROM;
said second means remaining operative only until such time as said transfer of data from said third volatile-DRAM into said non-volatile Flash ROM has been completed.
10. Modular memory apparatus for a data processing system susceptible to interruption of system power provided by a primary electrical power source, said modular memory apparatus comprising:
a module connectable to the data processing system;
a volatile memory element at least carried by said module, said volatile memory element for storing data accessible during operation of the data processing system;
a non-volatile memory element at least carried by said module together with said volatile memory element, said non-volatile memory element for storing at least some of the data stored in said volatile memory element;
an auxiliary battery power source carried by said module together with said volatile memory element and said non-volatile memory element; and
a controller at least carried by said module together with said volatile memory element, said non-volatile memory element, and said auxiliary battery power source, said module, together with said volatile memory element, said non-volatile memory element, said auxiliary battery power source connectable as a single unit to said data processing system, said controller for detecting the interruption of the system power and, responsive thereto, to effectuate powering of said controller by said auxiliary battery power source, and for effectuating transfer of the data stored in said volatile memory element to said non-volatile memory element.
US08/536,519 1995-09-28 1995-09-28 Power failure responsive apparatus and method having a shadow dram, a flash ROM, an auxiliary battery, and a controller Expired - Lifetime US5799200A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US08/536,519 US5799200A (en) 1995-09-28 1995-09-28 Power failure responsive apparatus and method having a shadow dram, a flash ROM, an auxiliary battery, and a controller

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US08/536,519 US5799200A (en) 1995-09-28 1995-09-28 Power failure responsive apparatus and method having a shadow dram, a flash ROM, an auxiliary battery, and a controller

Publications (1)

Publication Number Publication Date
US5799200A true US5799200A (en) 1998-08-25

Family

ID=24138828

Family Applications (1)

Application Number Title Priority Date Filing Date
US08/536,519 Expired - Lifetime US5799200A (en) 1995-09-28 1995-09-28 Power failure responsive apparatus and method having a shadow dram, a flash ROM, an auxiliary battery, and a controller

Country Status (1)

Country Link
US (1) US5799200A (en)

Cited By (375)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6026018A (en) * 1998-08-20 2000-02-15 Simtek Corporation Non-volatile, static random access memory with store disturb immunity
WO2001022205A1 (en) * 1999-09-21 2001-03-29 Bitmicro Networks, Inc. Method and system for controlling data in a computer system
US6282666B1 (en) * 1999-02-26 2001-08-28 Agere Systems Guardian Corp. Computer peripheral device having the capability to wake up from a cold state with information stored before cold powerdown
US20010051519A1 (en) * 2000-06-12 2001-12-13 Kouji Shirai Portable telephone set
US6336174B1 (en) * 1999-08-09 2002-01-01 Maxtor Corporation Hardware assisted memory backup system and method
WO2002086721A1 (en) * 2001-04-19 2002-10-31 International Business Machines Corporation Method and apparatus for improving reliability of write back cache information
EP1267357A2 (en) * 2001-06-07 2002-12-18 Ahrens & Birner Company GmbH Method and apparatus containing S-RAM portions of different access speed for reliable data retaining
US6536038B1 (en) * 1999-11-29 2003-03-18 Intel Corporation Dynamic update of non-upgradeable memory
US6547147B1 (en) * 1999-02-17 2003-04-15 Denso Corporation Portable optical information reading apparatus
US6556477B2 (en) 2001-05-21 2003-04-29 Ibm Corporation Integrated chip having SRAM, DRAM and flash memory and method for fabricating the same
US20030142573A1 (en) * 2002-01-29 2003-07-31 Floro William Edward Battery backed memory with low battery voltage trip, disconnect and lockout
US6629248B1 (en) * 2000-03-30 2003-09-30 Intel Corporation Apparatus and method for maintaining a security association for manageability across power failures
US20030196031A1 (en) * 2000-10-30 2003-10-16 Chen Jack Yajie Storage controller with the disk drive and the RAM in a hybrid architecture
WO2003091964A1 (en) * 2002-04-24 2003-11-06 Schlumbergersema Inc. Method of using flash memory for storing metering data
US6670234B2 (en) 2001-06-22 2003-12-30 International Business Machines Corporation Method of integrating volatile and non-volatile memory cells on the same substrate and a semiconductor memory device thereof
US6693840B2 (en) * 2001-10-17 2004-02-17 Matsushita Electric Industrial Co., Ltd. Non-volatile semiconductor memory device with enhanced erase/write cycle endurance
US20040057267A1 (en) * 1999-11-09 2004-03-25 Fujitsu Limited Semiconductor memory device, and method of controlling the same
US20040093137A1 (en) * 2002-10-21 2004-05-13 Denso Corporation Electronic control unit for controlling updating of data in non-volatile memory
US20040103238A1 (en) * 2002-11-26 2004-05-27 M-Systems Flash Disk Pioneers Ltd. Appliance, including a flash memory, that is robust under power failure
EP1449161A1 (en) * 2001-08-24 2004-08-25 United Parcel Service Of America, Inc. Portable data acquisition and management system and associated device and method
US20040174742A1 (en) * 2001-09-12 2004-09-09 Renesas Technology Corp. Non-volatile memory device and data storing method
US6822346B2 (en) * 2002-01-29 2004-11-23 Rockwell Automation Technologies, Inc. Battery backed memory with battery disconnect for improved battery life
US20050036387A1 (en) * 2002-04-24 2005-02-17 Seal Brian K. Method of using flash memory for storing metering data
US20050132150A1 (en) * 2003-08-28 2005-06-16 International Business Machines Corp. Data storage systems
US20050180349A1 (en) * 1997-02-06 2005-08-18 Siavash Alamouti Method for frequency division duplex communications
US20060072369A1 (en) * 2004-10-04 2006-04-06 Research In Motion Limited System and method for automatically saving memory contents of a data processing device on power failure
US20060080515A1 (en) * 2004-10-12 2006-04-13 Lefthand Networks, Inc. Non-Volatile Memory Backup for Network Storage System
US20070097535A1 (en) * 2005-11-03 2007-05-03 Colegrove Daniel J Micro-journaling of data on a storage device
US20070101056A1 (en) * 2005-11-03 2007-05-03 Colegrove Daniel J Micro-journaling of data on a storage device
US20070220227A1 (en) * 2006-03-17 2007-09-20 Emc Corporation Techniques for managing data within a data storage system utilizing a flash-based memory vault
US20070288677A1 (en) * 2000-07-06 2007-12-13 Onspec Electronic, Inc. Field-Operable, Stand-Alone Apparatus for Media Recovery and Regeneration
US20080061403A1 (en) * 2006-09-08 2008-03-13 Zhong-Xiang He Dielectric layers for metal lines in semiconductor chips
US20080088482A1 (en) * 2006-10-15 2008-04-17 Fujitsu Ten Limited Vehicle information recording apparatus
US20080112223A1 (en) * 2006-11-13 2008-05-15 Giacobbe Mark C Method and apparatus for collecting data related to the status of an electrical power system
US7397707B2 (en) 2000-09-14 2008-07-08 Sandisk Corporation Compressed event counting technique and application to a flash memory system
US20080235471A1 (en) * 2007-03-23 2008-09-25 Michael Feldman Smart batteryless backup device and method therefor
US20080299809A1 (en) * 2000-07-06 2008-12-04 Mcm Portfolio Llc Smartconnect flash card adapter
US20090019194A1 (en) * 2005-03-28 2009-01-15 Matsushita Electric Industrial Co., Ltd. Storage device
US20090031072A1 (en) * 2007-07-25 2009-01-29 Simtek Hybrid nonvolatile RAM
US20090031099A1 (en) * 2007-07-25 2009-01-29 Simtek Power interrupt recovery in a hybrid memory subsystem
US20090027014A1 (en) * 2007-07-25 2009-01-29 Simtek Capacitor save energy verification
US20090031098A1 (en) * 2007-07-25 2009-01-29 Simtek Variable partitioning in a hybrid memory subsystem
US7487316B1 (en) * 2001-09-17 2009-02-03 Rockwell Automation Technologies, Inc. Archive and restore system and methodology for on-line edits utilizing non-volatile buffering
US20090043951A1 (en) * 2007-08-06 2009-02-12 Anobit Technologies Ltd. Programming schemes for multi-level analog memory cells
US20090144600A1 (en) * 2007-11-30 2009-06-04 Anobit Technologies Ltd Efficient re-read operations from memory devices
US20090157964A1 (en) * 2007-12-16 2009-06-18 Anobit Technologies Ltd. Efficient data storage in multi-plane memory devices
US20090172425A1 (en) * 2007-12-31 2009-07-02 Simtek Digitally controlled dynamic power management unit for uninterruptible power supply
US20090198931A1 (en) * 2008-02-01 2009-08-06 Fujitsu Limited Information processing apparatus and data backup method
US7597268B2 (en) 2000-07-06 2009-10-06 Mcm Portfolio Llc Memory module which includes a form factor connector
US20100008174A1 (en) * 2008-07-10 2010-01-14 Agiga Tech Inc. Adaptive training and adjustment to changing capacitor values based upon age and usage behavior
US20100131827A1 (en) * 2007-05-12 2010-05-27 Anobit Technologies Ltd Memory device with internal signap processing unit
US7730330B1 (en) 2000-06-16 2010-06-01 Marc Fleischmann System and method for saving and restoring a processor state without executing any instructions from a first instruction set
US20100202240A1 (en) * 2009-02-11 2010-08-12 Stec, Inc. State of health monitored flash backed dram module
US20100202237A1 (en) * 2009-02-11 2010-08-12 Stec, Inc. Flash backed dram module with a selectable number of flash chips
US20100202238A1 (en) * 2009-02-11 2010-08-12 Stec, Inc. Flash backed dram module including logic for isolating the dram
US20100205470A1 (en) * 2009-02-11 2010-08-12 Stec, Inc. Flash backed dram module with state of health and/or status information accessible through a configuration data bus
US20100205349A1 (en) * 2009-02-11 2010-08-12 Stec, Inc. Segmented-memory flash backed dram module
US20100202239A1 (en) * 2009-02-11 2010-08-12 Stec, Inc. Staged-backup flash backed dram module
US20100205348A1 (en) * 2009-02-11 2010-08-12 Stec, Inc Flash backed dram module storing parameter information of the dram module in the flash
WO2010093356A1 (en) * 2009-02-11 2010-08-19 Stec, Inc. A flash backed dram module
US20100220509A1 (en) * 2009-03-01 2010-09-02 Anobit Technologies Ltd Selective Activation of Programming Schemes in Analog Memory Cell Arrays
US20110010499A1 (en) * 2009-07-09 2011-01-13 Fujitsu Limited Storage system, method of controlling storage system, and method of controlling control apparatus
US20110058440A1 (en) * 2009-09-09 2011-03-10 Fusion-Io, Inc. Apparatus, system, and method for power reduction management in a storage device
US20110072290A1 (en) * 2009-09-24 2011-03-24 Xyratex Technology Limited Auxiliary power supply, a method of providing power to a data storage system and a back-up power supply charging circuit
US8072834B2 (en) 2005-08-25 2011-12-06 Cypress Semiconductor Corporation Line driver circuit and method with standby mode of operation
US8145984B2 (en) 2006-10-30 2012-03-27 Anobit Technologies Ltd. Reading memory cells using multiple thresholds
US8151166B2 (en) 2007-01-24 2012-04-03 Anobit Technologies Ltd. Reduction of back pattern dependency effects in memory devices
US8151163B2 (en) 2006-12-03 2012-04-03 Anobit Technologies Ltd. Automatic defect management in memory devices
US8156398B2 (en) 2008-02-05 2012-04-10 Anobit Technologies Ltd. Parameter estimation based on error correction code parity check equations
US8156403B2 (en) 2006-05-12 2012-04-10 Anobit Technologies Ltd. Combined distortion estimation and error correction coding for memory devices
US8169825B1 (en) * 2008-09-02 2012-05-01 Anobit Technologies Ltd. Reliable data storage in analog memory cells subjected to long retention periods
US8174857B1 (en) 2008-12-31 2012-05-08 Anobit Technologies Ltd. Efficient readout schemes for analog memory cell devices using multiple read threshold sets
US8174905B2 (en) 2007-09-19 2012-05-08 Anobit Technologies Ltd. Programming orders for reducing distortion in arrays of multi-level analog memory cells
US8208304B2 (en) 2008-11-16 2012-06-26 Anobit Technologies Ltd. Storage at M bits/cell density in N bits/cell analog memory cell devices, M>N
US8209588B2 (en) 2007-12-12 2012-06-26 Anobit Technologies Ltd. Efficient interference cancellation in analog memory cell arrays
US8230300B2 (en) 2008-03-07 2012-07-24 Apple Inc. Efficient readout from analog memory cells using data compression
US8234545B2 (en) 2007-05-12 2012-07-31 Apple Inc. Data storage with incremental redundancy
US8238157B1 (en) 2009-04-12 2012-08-07 Apple Inc. Selective re-programming of analog memory cells
US8239734B1 (en) 2008-10-15 2012-08-07 Apple Inc. Efficient data storage in storage device arrays
US8239735B2 (en) 2006-05-12 2012-08-07 Apple Inc. Memory Device with adaptive capacity
US8248831B2 (en) 2008-12-31 2012-08-21 Apple Inc. Rejuvenation of analog memory cells
US8259506B1 (en) 2009-03-25 2012-09-04 Apple Inc. Database of memory read thresholds
US8261159B1 (en) 2008-10-30 2012-09-04 Apple, Inc. Data scrambling schemes for memory devices
US8270246B2 (en) 2007-11-13 2012-09-18 Apple Inc. Optimized selection of memory chips in multi-chips memory devices
US8315096B2 (en) 2006-12-22 2012-11-20 Cypress Semiconductor Corporation Method and apparatus to implement a reset function in a non-volatile static random access memory
US8369141B2 (en) 2007-03-12 2013-02-05 Apple Inc. Adaptive estimation of memory cell read thresholds
US8400858B2 (en) 2008-03-18 2013-03-19 Apple Inc. Memory device with reduced sense time readout
US8433941B2 (en) * 2001-10-03 2013-04-30 Hewlett-Packard Deveolpment Company, L.P. Information preservation on a portable electronic device
US20130145085A1 (en) * 2008-06-18 2013-06-06 Super Talent Technology Corp. Virtual Memory Device (VMD) Application/Driver with Dual-Level Interception for Data-Type Splitting, Meta-Page Grouping, and Diversion of Temp Files to Ramdisks for Enhanced Flash Endurance
US8468317B2 (en) 2011-06-07 2013-06-18 Agiga Tech Inc. Apparatus and method for improved data restore in a memory system
US8479080B1 (en) 2009-07-12 2013-07-02 Apple Inc. Adaptive over-provisioning in memory systems
US8482978B1 (en) 2008-09-14 2013-07-09 Apple Inc. Estimation of memory cell read thresholds by sampling inside programming level distribution intervals
US8493783B2 (en) 2008-03-18 2013-07-23 Apple Inc. Memory device readout using multiple sense times
US8495465B1 (en) 2009-10-15 2013-07-23 Apple Inc. Error correction coding over multiple memory pages
US8493781B1 (en) 2010-08-12 2013-07-23 Apple Inc. Interference mitigation using individual word line erasure operations
US8498151B1 (en) 2008-08-05 2013-07-30 Apple Inc. Data storage in analog memory cells using modified pass voltages
US8527693B2 (en) 2010-12-13 2013-09-03 Fusion IO, Inc. Apparatus, system, and method for auto-commit memory
US8527819B2 (en) 2007-10-19 2013-09-03 Apple Inc. Data storage in analog memory cell arrays having erase failures
US8572311B1 (en) 2010-01-11 2013-10-29 Apple Inc. Redundant data storage in multi-die memory systems
US8572423B1 (en) 2010-06-22 2013-10-29 Apple Inc. Reducing peak current in memory systems
US8570804B2 (en) 2006-05-12 2013-10-29 Apple Inc. Distortion estimation and cancellation in memory devices
WO2013165385A1 (en) * 2012-04-30 2013-11-07 Hewlett-Packard Development Company, L.P. Preventing a hybrid memory module from being mapped
US8595591B1 (en) 2010-07-11 2013-11-26 Apple Inc. Interference-aware assignment of programming levels in analog memory cells
CN103488578A (en) * 2012-12-28 2014-01-01 晶天电子(深圳)有限公司 Vmd application/driver
US8645794B1 (en) 2010-07-31 2014-02-04 Apple Inc. Data storage in analog memory cells using a non-integer number of bits per cell
US8677054B1 (en) 2009-12-16 2014-03-18 Apple Inc. Memory management schemes for non-volatile memory devices
US8694853B1 (en) 2010-05-04 2014-04-08 Apple Inc. Read commands for reading interfering memory cells
US8694854B1 (en) 2010-08-17 2014-04-08 Apple Inc. Read threshold setting based on soft readout statistics
US8694814B1 (en) 2010-01-10 2014-04-08 Apple Inc. Reuse of host hibernation storage space by memory controller
US8832354B2 (en) 2009-03-25 2014-09-09 Apple Inc. Use of host system resources by memory controller
US8856475B1 (en) 2010-08-01 2014-10-07 Apple Inc. Efficient selection of memory blocks for compaction
US8922721B2 (en) 2013-03-15 2014-12-30 Samsung Electronics Co., Ltd. Display apparatus and control method thereof
US8924661B1 (en) 2009-01-18 2014-12-30 Apple Inc. Memory system including a controller and processors associated with memory devices
US8949684B1 (en) 2008-09-02 2015-02-03 Apple Inc. Segmented data storage
US8972627B2 (en) 2009-09-09 2015-03-03 Fusion-Io, Inc. Apparatus, system, and method for managing operations for data storage media
US8984216B2 (en) 2010-09-09 2015-03-17 Fusion-Io, Llc Apparatus, system, and method for managing lifetime of a storage device
US9021181B1 (en) 2010-09-27 2015-04-28 Apple Inc. Memory management for unifying memory cell conditions by using maximum time intervals
US9021158B2 (en) 2009-09-09 2015-04-28 SanDisk Technologies, Inc. Program suspend/resume for memory
US9043669B1 (en) 2012-05-18 2015-05-26 Bitmicro Networks, Inc. Distributed ECC engine for storage media
US9047178B2 (en) 2010-12-13 2015-06-02 SanDisk Technologies, Inc. Auto-commit memory synchronization
US9098270B1 (en) 2011-11-01 2015-08-04 Cypress Semiconductor Corporation Device and method of establishing sleep mode architecture for NVSRAMs
US9099187B2 (en) 2009-09-14 2015-08-04 Bitmicro Networks, Inc. Reducing erase cycles in an electronic storage device that uses at least one erase-limited memory device
US9104580B1 (en) 2010-07-27 2015-08-11 Apple Inc. Cache memory for hybrid disk drives
US20150248249A1 (en) * 2007-06-01 2015-09-03 Netlist, Inc. Redundant backup using non-volatile memory
US9141505B1 (en) * 2012-09-27 2015-09-22 Emc Corporation Adaptive failure survivability in a storage system using save time and data transfer after power loss
US9208071B2 (en) 2010-12-13 2015-12-08 SanDisk Technologies, Inc. Apparatus, system, and method for accessing memory
US9218278B2 (en) 2010-12-13 2015-12-22 SanDisk Technologies, Inc. Auto-commit memory
US9223514B2 (en) 2009-09-09 2015-12-29 SanDisk Technologies, Inc. Erase suspend/resume for memory
US9348539B1 (en) * 2013-03-12 2016-05-24 Inphi Corporation Memory centric computing
US9372755B1 (en) 2011-10-05 2016-06-21 Bitmicro Networks, Inc. Adaptive power cycle sequences for data recovery
US9389665B1 (en) * 2015-06-19 2016-07-12 Rockwell Collins, Inc. Power warning monitor system and method
US9400617B2 (en) 2013-03-15 2016-07-26 Bitmicro Networks, Inc. Hardware-assisted DMA transfer with dependency table configured to permit-in parallel-data drain from cache without processor intervention when filled or drained
US9423457B2 (en) 2013-03-14 2016-08-23 Bitmicro Networks, Inc. Self-test solution for delay locked loops
US9430386B2 (en) 2013-03-15 2016-08-30 Bitmicro Networks, Inc. Multi-leveled cache management in a hybrid storage system
US9501436B1 (en) 2013-03-15 2016-11-22 Bitmicro Networks, Inc. Multi-level message passing descriptor
WO2016195961A1 (en) * 2015-05-29 2016-12-08 Pure Storage, Inc. Buffering data to be written to an array of non-volatile storage devices
US9558135B2 (en) 2000-07-06 2017-01-31 Larry Lawson Jones Flashcard reader and converter for reading serial and parallel flashcards
US9594678B1 (en) 2015-05-27 2017-03-14 Pure Storage, Inc. Preventing duplicate entries of identical data in a storage device
US9594512B1 (en) 2015-06-19 2017-03-14 Pure Storage, Inc. Attributing consumed storage capacity among entities storing data in a storage array
US9600184B2 (en) 2007-12-06 2017-03-21 Sandisk Technologies Llc Apparatus, system, and method for coordinating storage requests in a multi-processor/multi-thread environment
US9666244B2 (en) 2014-03-01 2017-05-30 Fusion-Io, Inc. Dividing a storage procedure
US9672178B1 (en) 2013-03-15 2017-06-06 Bitmicro Networks, Inc. Bit-mapped DMA transfer with dependency table configured to monitor status so that a processor is not rendered as a bottleneck in a system
US9678863B2 (en) 2012-06-12 2017-06-13 Sandisk Technologies, Llc Hybrid checkpointed memory
US9684520B2 (en) 2011-10-20 2017-06-20 Smart Modular Technologies, Inc. Computing system with non-disruptive fast memory restore mechanism and method of operation thereof
US20170177069A1 (en) * 2015-12-21 2017-06-22 Intel Corporation Smart power adapters and related systems and methods
US9696918B2 (en) 2014-07-13 2017-07-04 Apple Inc. Protection and recovery from sudden power failure in non-volatile memory devices
US9716755B2 (en) 2015-05-26 2017-07-25 Pure Storage, Inc. Providing cloud storage array services by a local storage array in a data center
US9720603B1 (en) 2013-03-15 2017-08-01 Bitmicro Networks, Inc. IOC to IOC distributed caching architecture
US9734067B1 (en) 2013-03-15 2017-08-15 Bitmicro Networks, Inc. Write buffering
US9734086B2 (en) 2006-12-06 2017-08-15 Sandisk Technologies Llc Apparatus, system, and method for a device shared between multiple independent hosts
US9740414B2 (en) 2015-10-29 2017-08-22 Pure Storage, Inc. Optimizing copy operations
US9754634B2 (en) 2011-11-23 2017-09-05 Smart Modular Technologies, Inc. Memory management system with power source and method of manufacture thereof
US9760297B2 (en) 2016-02-12 2017-09-12 Pure Storage, Inc. Managing input/output (‘I/O’) queues in a data storage system
US9760479B2 (en) 2015-12-02 2017-09-12 Pure Storage, Inc. Writing data in a storage system that includes a first type of storage device and a second type of storage device
US9779016B1 (en) 2012-07-25 2017-10-03 Smart Modular Technologies, Inc. Computing system with backup and recovery mechanism and method of operation thereof
US9798688B1 (en) 2013-03-15 2017-10-24 Bitmicro Networks, Inc. Bus arbitration with routing and failover mechanism
US9811461B1 (en) 2014-04-17 2017-11-07 Bitmicro Networks, Inc. Data storage system
US9811264B1 (en) 2016-04-28 2017-11-07 Pure Storage, Inc. Deploying client-specific applications in a storage system utilizing redundant system resources
US9817603B1 (en) 2016-05-20 2017-11-14 Pure Storage, Inc. Data migration in a storage array that includes a plurality of storage devices
US9841921B2 (en) 2016-04-27 2017-12-12 Pure Storage, Inc. Migrating data in a storage array that includes a plurality of storage devices
US9842024B1 (en) 2013-03-15 2017-12-12 Bitmicro Networks, Inc. Flash electronic disk with RAID controller
US9851762B1 (en) 2015-08-06 2017-12-26 Pure Storage, Inc. Compliant printed circuit board (‘PCB’) within an enclosure
US9858084B2 (en) 2013-03-15 2018-01-02 Bitmicro Networks, Inc. Copying of power-on reset sequencer descriptor from nonvolatile memory to random access memory
US9875205B1 (en) 2013-03-15 2018-01-23 Bitmicro Networks, Inc. Network of memory systems
US20180024764A1 (en) * 2016-07-22 2018-01-25 Intel Corporation Technologies for accelerating data writes
US9882913B1 (en) 2015-05-29 2018-01-30 Pure Storage, Inc. Delivering authorization and authentication for a user of a storage array from a cloud
US9886314B2 (en) 2016-01-28 2018-02-06 Pure Storage, Inc. Placing workloads in a multi-array system
US9892071B2 (en) 2015-08-03 2018-02-13 Pure Storage, Inc. Emulating a remote direct memory access (‘RDMA’) link between controllers in a storage array
US9910618B1 (en) 2017-04-10 2018-03-06 Pure Storage, Inc. Migrating applications executing on a storage system
US9916213B1 (en) 2013-03-15 2018-03-13 Bitmicro Networks, Inc. Bus arbitration with routing and failover mechanism
US9928186B2 (en) 2007-06-01 2018-03-27 Netlist, Inc. Flash-DRAM hybrid memory module
US9928126B1 (en) 2017-06-01 2018-03-27 Apple Inc. Recovery from cross-temperature read failures by programming neighbor word lines
US9933950B2 (en) 2015-01-16 2018-04-03 Sandisk Technologies Llc Storage operation interrupt
US9934045B1 (en) 2013-03-15 2018-04-03 Bitmicro Networks, Inc. Embedded system boot from a storage device
US9952991B1 (en) 2014-04-17 2018-04-24 Bitmicro Networks, Inc. Systematic method on queuing of descriptors for multiple flash intelligent DMA engine operation
US9959043B2 (en) 2016-03-16 2018-05-01 Pure Storage, Inc. Performing a non-disruptive upgrade of data in a storage system
US9971524B1 (en) 2013-03-15 2018-05-15 Bitmicro Networks, Inc. Scatter-gather approach for parallel data transfer in a mass storage system
US9996284B2 (en) 2013-06-11 2018-06-12 Netlist, Inc. Non-volatile memory storage for multi-channel memory system
US10009438B2 (en) 2015-05-20 2018-06-26 Sandisk Technologies Llc Transaction log acceleration
US10007459B2 (en) 2016-10-20 2018-06-26 Pure Storage, Inc. Performance tuning in a storage system that includes one or more storage devices
US20180182454A1 (en) * 2008-07-31 2018-06-28 Unity Semiconductor Corporation Preservation circuit and methods to maintain values representing data in one or more layers of memory
US10021170B2 (en) 2015-05-29 2018-07-10 Pure Storage, Inc. Managing a storage array using client-side services
US10025736B1 (en) 2014-04-17 2018-07-17 Bitmicro Networks, Inc. Exchange message protocol message transmission between two devices
US10031571B2 (en) * 2016-07-06 2018-07-24 Dell Products L.P. Systems and methods for power loss protection of storage resources
US10042792B1 (en) 2014-04-17 2018-08-07 Bitmicro Networks, Inc. Method for transferring and receiving frames across PCI express bus for SSD device
US10055150B1 (en) 2014-04-17 2018-08-21 Bitmicro Networks, Inc. Writing volatile scattered memory metadata to flash device
US10078604B1 (en) 2014-04-17 2018-09-18 Bitmicro Networks, Inc. Interrupt coalescing
US10120586B1 (en) 2007-11-16 2018-11-06 Bitmicro, Llc Memory transaction with reduced latency
US10133686B2 (en) 2009-09-07 2018-11-20 Bitmicro Llc Multilevel memory bus system
US10149399B1 (en) 2009-09-04 2018-12-04 Bitmicro Llc Solid state drive with improved enclosure assembly
US10146585B2 (en) 2016-09-07 2018-12-04 Pure Storage, Inc. Ensuring the fair utilization of system resources using workload based, time-independent scheduling
US10162566B2 (en) 2016-11-22 2018-12-25 Pure Storage, Inc. Accumulating application-level statistics in a storage system
US10162835B2 (en) 2015-12-15 2018-12-25 Pure Storage, Inc. Proactive management of a plurality of storage arrays in a multi-array system
US20190034098A1 (en) * 2015-03-30 2019-01-31 Toshiba Memory Corporation Solid-state drive with non-volatile random access memory
US10198205B1 (en) 2016-12-19 2019-02-05 Pure Storage, Inc. Dynamically adjusting a number of storage devices utilized to simultaneously service write operations
US10198194B2 (en) 2015-08-24 2019-02-05 Pure Storage, Inc. Placing data within a storage device of a flash array
US10235229B1 (en) 2016-09-07 2019-03-19 Pure Storage, Inc. Rehabilitating storage devices in a storage array that includes a plurality of storage devices
US10275285B1 (en) 2017-10-19 2019-04-30 Pure Storage, Inc. Data transformation caching in an artificial intelligence infrastructure
US10284232B2 (en) 2015-10-28 2019-05-07 Pure Storage, Inc. Dynamic error processing in a storage device
WO2019092497A1 (en) * 2017-11-13 2019-05-16 Weka. Io Ltd. Methods and systems for power failure resistance for a distributed storage system
US10296258B1 (en) 2018-03-09 2019-05-21 Pure Storage, Inc. Offloading data storage to a decentralized storage network
US10296236B2 (en) 2015-07-01 2019-05-21 Pure Storage, Inc. Offloading device management responsibilities from a storage device in an array of storage devices
US10303390B1 (en) 2016-05-02 2019-05-28 Pure Storage, Inc. Resolving fingerprint collisions in flash storage system
US10310740B2 (en) 2015-06-23 2019-06-04 Pure Storage, Inc. Aligning memory access operations to a geometry of a storage device
US10318196B1 (en) 2015-06-10 2019-06-11 Pure Storage, Inc. Stateless storage system controller in a direct flash storage system
US10326836B2 (en) 2015-12-08 2019-06-18 Pure Storage, Inc. Partially replicating a snapshot between storage systems
US10331588B2 (en) 2016-09-07 2019-06-25 Pure Storage, Inc. Ensuring the appropriate utilization of system resources using weighted workload based, time-independent scheduling
US10346043B2 (en) 2015-12-28 2019-07-09 Pure Storage, Inc. Adaptive computing for data compression
US10353777B2 (en) 2015-10-30 2019-07-16 Pure Storage, Inc. Ensuring crash-safe forward progress of a system configuration update
US10360214B2 (en) 2017-10-19 2019-07-23 Pure Storage, Inc. Ensuring reproducibility in an artificial intelligence infrastructure
US10365982B1 (en) 2017-03-10 2019-07-30 Pure Storage, Inc. Establishing a synchronous replication relationship between two or more storage systems
US10374868B2 (en) 2015-10-29 2019-08-06 Pure Storage, Inc. Distributed command processing in a flash storage system
US10409742B2 (en) 2015-10-07 2019-09-10 Rambus Inc. Interface for memory readout from a memory component in the event of fault
US10417092B2 (en) 2017-09-07 2019-09-17 Pure Storage, Inc. Incremental RAID stripe update parity calculation
US10452310B1 (en) 2016-07-13 2019-10-22 Pure Storage, Inc. Validating cabling for storage component admission to a storage array
US10452444B1 (en) 2017-10-19 2019-10-22 Pure Storage, Inc. Storage system with compute resources and shared storage resources
US10454810B1 (en) 2017-03-10 2019-10-22 Pure Storage, Inc. Managing host definitions across a plurality of storage systems
US10459652B2 (en) 2016-07-27 2019-10-29 Pure Storage, Inc. Evacuating blades in a storage array that includes a plurality of blades
US10459664B1 (en) 2017-04-10 2019-10-29 Pure Storage, Inc. Virtualized copy-by-reference
US10467107B1 (en) 2017-11-01 2019-11-05 Pure Storage, Inc. Maintaining metadata resiliency among storage device failures
US10474363B1 (en) 2016-07-29 2019-11-12 Pure Storage, Inc. Space reporting in a storage system
US10484174B1 (en) 2017-11-01 2019-11-19 Pure Storage, Inc. Protecting an encryption key for data stored in a storage system that includes a plurality of storage devices
US10489318B1 (en) 2013-03-15 2019-11-26 Bitmicro Networks, Inc. Scatter-gather approach for parallel data transfer in a mass storage system
US10489307B2 (en) 2017-01-05 2019-11-26 Pure Storage, Inc. Periodically re-encrypting user data stored on a storage device
US10503700B1 (en) 2017-01-19 2019-12-10 Pure Storage, Inc. On-demand content filtering of snapshots within a storage system
US10503427B2 (en) 2017-03-10 2019-12-10 Pure Storage, Inc. Synchronously replicating datasets and other managed objects to cloud-based storage systems
US10509581B1 (en) 2017-11-01 2019-12-17 Pure Storage, Inc. Maintaining write consistency in a multi-threaded storage system
US10514978B1 (en) 2015-10-23 2019-12-24 Pure Storage, Inc. Automatic deployment of corrective measures for storage arrays
US10521151B1 (en) 2018-03-05 2019-12-31 Pure Storage, Inc. Determining effective space utilization in a storage system
US10552090B2 (en) 2017-09-07 2020-02-04 Pure Storage, Inc. Solid state drives with multiple types of addressable memory
US10552050B1 (en) 2017-04-07 2020-02-04 Bitmicro Llc Multi-dimensional computer storage system
US10572460B2 (en) 2016-02-11 2020-02-25 Pure Storage, Inc. Compressing data in dependence upon characteristics of a storage system
US10599536B1 (en) 2015-10-23 2020-03-24 Pure Storage, Inc. Preventing storage errors using problem signatures
US10613791B2 (en) 2017-06-12 2020-04-07 Pure Storage, Inc. Portable snapshot replication between storage systems
US10671494B1 (en) 2017-11-01 2020-06-02 Pure Storage, Inc. Consistent selection of replicated datasets during storage system recovery
US10671302B1 (en) 2018-10-26 2020-06-02 Pure Storage, Inc. Applying a rate limit across a plurality of storage systems
US10671439B1 (en) 2016-09-07 2020-06-02 Pure Storage, Inc. Workload planning with quality-of-service (‘QOS’) integration
US10691567B2 (en) 2016-06-03 2020-06-23 Pure Storage, Inc. Dynamically forming a failure domain in a storage system that includes a plurality of blades
CN111625389A (en) * 2020-05-28 2020-09-04 山东海量信息技术研究院 VR fault data acquisition method and device and related components
US10789020B2 (en) 2017-06-12 2020-09-29 Pure Storage, Inc. Recovering data within a unified storage element
US10795598B1 (en) 2017-12-07 2020-10-06 Pure Storage, Inc. Volume migration for storage systems synchronously replicating a dataset
US10817502B2 (en) 2010-12-13 2020-10-27 Sandisk Technologies Llc Persistent memory management
US10817421B2 (en) 2010-12-13 2020-10-27 Sandisk Technologies Llc Persistent data structures
US10817392B1 (en) 2017-11-01 2020-10-27 Pure Storage, Inc. Ensuring resiliency to storage device failures in a storage system that includes a plurality of storage devices
US10834086B1 (en) 2015-05-29 2020-11-10 Pure Storage, Inc. Hybrid cloud-based authentication for flash storage array access
US10838833B1 (en) 2018-03-26 2020-11-17 Pure Storage, Inc. Providing for high availability in a data analytics pipeline without replicas
US10853148B1 (en) 2017-06-12 2020-12-01 Pure Storage, Inc. Migrating workloads between a plurality of execution environments
US10871922B2 (en) 2018-05-22 2020-12-22 Pure Storage, Inc. Integrated storage management between storage systems and container orchestrators
US10884636B1 (en) 2017-06-12 2021-01-05 Pure Storage, Inc. Presenting workload performance in a storage system
US10908966B1 (en) 2016-09-07 2021-02-02 Pure Storage, Inc. Adapting target service times in a storage system
US10917470B1 (en) 2018-11-18 2021-02-09 Pure Storage, Inc. Cloning storage systems in a cloud computing environment
US10917471B1 (en) 2018-03-15 2021-02-09 Pure Storage, Inc. Active membership in a cloud-based storage system
US10924548B1 (en) 2018-03-15 2021-02-16 Pure Storage, Inc. Symmetric storage using a cloud-based storage system
US10929226B1 (en) 2017-11-21 2021-02-23 Pure Storage, Inc. Providing for increased flexibility for large scale parity
US10936238B2 (en) 2017-11-28 2021-03-02 Pure Storage, Inc. Hybrid data tiering
US10942650B1 (en) 2018-03-05 2021-03-09 Pure Storage, Inc. Reporting capacity utilization in a storage system
US10963189B1 (en) 2018-11-18 2021-03-30 Pure Storage, Inc. Coalescing write operations in a cloud-based storage system
US10976962B2 (en) 2018-03-15 2021-04-13 Pure Storage, Inc. Servicing I/O operations in a cloud-based storage system
US10992598B2 (en) 2018-05-21 2021-04-27 Pure Storage, Inc. Synchronously replicating when a mediation service becomes unavailable
US10992533B1 (en) 2018-01-30 2021-04-27 Pure Storage, Inc. Policy based path management
US10990282B1 (en) 2017-11-28 2021-04-27 Pure Storage, Inc. Hybrid data tiering with cloud storage
US11003369B1 (en) 2019-01-14 2021-05-11 Pure Storage, Inc. Performing a tune-up procedure on a storage device during a boot process
US11016824B1 (en) 2017-06-12 2021-05-25 Pure Storage, Inc. Event identification with out-of-order reporting in a cloud-based environment
US11036677B1 (en) 2017-12-14 2021-06-15 Pure Storage, Inc. Replicated data integrity
US11042452B1 (en) 2019-03-20 2021-06-22 Pure Storage, Inc. Storage system data recovery using data recovery as a service
US11048590B1 (en) 2018-03-15 2021-06-29 Pure Storage, Inc. Data consistency during recovery in a cloud-based storage system
US11068162B1 (en) 2019-04-09 2021-07-20 Pure Storage, Inc. Storage management in a cloud data store
US11089105B1 (en) 2017-12-14 2021-08-10 Pure Storage, Inc. Synchronously replicating datasets in cloud-based storage systems
US11086553B1 (en) 2019-08-28 2021-08-10 Pure Storage, Inc. Tiering duplicated objects in a cloud-based object store
US11095706B1 (en) 2018-03-21 2021-08-17 Pure Storage, Inc. Secure cloud-based storage system management
US11093139B1 (en) 2019-07-18 2021-08-17 Pure Storage, Inc. Durably storing data within a virtual storage system
US11102298B1 (en) 2015-05-26 2021-08-24 Pure Storage, Inc. Locally providing cloud storage services for fleet management
CN113342557A (en) * 2020-03-03 2021-09-03 慧荣科技股份有限公司 Flash memory data fault detection method and computer readable storage medium
US11112990B1 (en) 2016-04-27 2021-09-07 Pure Storage, Inc. Managing storage device evacuation
US11126364B2 (en) 2019-07-18 2021-09-21 Pure Storage, Inc. Virtual storage system architecture
US11146564B1 (en) 2018-07-24 2021-10-12 Pure Storage, Inc. Login authentication in a cloud storage platform
US11150834B1 (en) 2018-03-05 2021-10-19 Pure Storage, Inc. Determining storage consumption in a storage system
US11163624B2 (en) 2017-01-27 2021-11-02 Pure Storage, Inc. Dynamically adjusting an amount of log data generated for a storage system
US11171950B1 (en) 2018-03-21 2021-11-09 Pure Storage, Inc. Secure cloud-based storage system management
US11169727B1 (en) 2017-03-10 2021-11-09 Pure Storage, Inc. Synchronous replication between storage systems with virtualized storage
US11210009B1 (en) 2018-03-15 2021-12-28 Pure Storage, Inc. Staging data in a cloud-based storage system
US11210133B1 (en) 2017-06-12 2021-12-28 Pure Storage, Inc. Workload mobility between disparate execution environments
US11221778B1 (en) 2019-04-02 2022-01-11 Pure Storage, Inc. Preparing data for deduplication
US11231858B2 (en) 2016-05-19 2022-01-25 Pure Storage, Inc. Dynamically configuring a storage system to facilitate independent scaling of resources
US11288138B1 (en) 2018-03-15 2022-03-29 Pure Storage, Inc. Recovery from a system fault in a cloud-based storage system
US11294588B1 (en) 2015-08-24 2022-04-05 Pure Storage, Inc. Placing data within a storage device
US11301152B1 (en) 2020-04-06 2022-04-12 Pure Storage, Inc. Intelligently moving data between storage systems
US11321006B1 (en) 2020-03-25 2022-05-03 Pure Storage, Inc. Data loss prevention during transitions from a replication source
US11327676B1 (en) 2019-07-18 2022-05-10 Pure Storage, Inc. Predictive data streaming in a virtual storage system
US11340800B1 (en) 2017-01-19 2022-05-24 Pure Storage, Inc. Content masking in a storage system
US11340939B1 (en) 2017-06-12 2022-05-24 Pure Storage, Inc. Application-aware analytics for storage systems
US11340837B1 (en) 2018-11-18 2022-05-24 Pure Storage, Inc. Storage system management via a remote console
US11349917B2 (en) 2020-07-23 2022-05-31 Pure Storage, Inc. Replication handling among distinct networks
US11347697B1 (en) 2015-12-15 2022-05-31 Pure Storage, Inc. Proactively optimizing a storage system
US11360689B1 (en) 2019-09-13 2022-06-14 Pure Storage, Inc. Cloning a tracking copy of replica data
US11360844B1 (en) 2015-10-23 2022-06-14 Pure Storage, Inc. Recovery of a container storage provider
US11379132B1 (en) 2016-10-20 2022-07-05 Pure Storage, Inc. Correlating medical sensor data
US20220214954A1 (en) * 2018-09-07 2022-07-07 Phoenix Contact Gmbh & Co. Kg Electronic device for use in an automation system, and an automation system
US11392553B1 (en) 2018-04-24 2022-07-19 Pure Storage, Inc. Remote data management
US11392555B2 (en) 2019-05-15 2022-07-19 Pure Storage, Inc. Cloud-based file services
US11397545B1 (en) 2021-01-20 2022-07-26 Pure Storage, Inc. Emulating persistent reservations in a cloud-based storage system
US11403000B1 (en) 2018-07-20 2022-08-02 Pure Storage, Inc. Resiliency in a cloud-based storage system
US11416298B1 (en) 2018-07-20 2022-08-16 Pure Storage, Inc. Providing application-specific storage by a storage system
US11422731B1 (en) 2017-06-12 2022-08-23 Pure Storage, Inc. Metadata-based replication of a dataset
US11431488B1 (en) 2020-06-08 2022-08-30 Pure Storage, Inc. Protecting local key generation using a remote key management service
US11436344B1 (en) 2018-04-24 2022-09-06 Pure Storage, Inc. Secure encryption in deduplication cluster
US11442825B2 (en) 2017-03-10 2022-09-13 Pure Storage, Inc. Establishing a synchronous replication relationship between two or more storage systems
US11442669B1 (en) 2018-03-15 2022-09-13 Pure Storage, Inc. Orchestrating a virtual storage system
US11442652B1 (en) 2020-07-23 2022-09-13 Pure Storage, Inc. Replication handling during storage system transportation
US11455168B1 (en) 2017-10-19 2022-09-27 Pure Storage, Inc. Batch building for deep learning training workloads
US11455409B2 (en) 2018-05-21 2022-09-27 Pure Storage, Inc. Storage layer data obfuscation
US11461273B1 (en) 2016-12-20 2022-10-04 Pure Storage, Inc. Modifying storage distribution in a storage system that includes one or more storage devices
US11477280B1 (en) 2017-07-26 2022-10-18 Pure Storage, Inc. Integrating cloud storage services
US11481261B1 (en) 2016-09-07 2022-10-25 Pure Storage, Inc. Preventing extended latency in a storage system
US11487715B1 (en) 2019-07-18 2022-11-01 Pure Storage, Inc. Resiliency in a cloud-based storage system
US11494267B2 (en) 2020-04-14 2022-11-08 Pure Storage, Inc. Continuous value data redundancy
US11494692B1 (en) 2018-03-26 2022-11-08 Pure Storage, Inc. Hyperscale artificial intelligence and machine learning infrastructure
US11503031B1 (en) 2015-05-29 2022-11-15 Pure Storage, Inc. Storage array access control from cloud-based user authorization and authentication
US11526408B2 (en) 2019-07-18 2022-12-13 Pure Storage, Inc. Data recovery in a virtual storage system
US11526405B1 (en) 2018-11-18 2022-12-13 Pure Storage, Inc. Cloud-based disaster recovery
US11531577B1 (en) 2016-09-07 2022-12-20 Pure Storage, Inc. Temporarily limiting access to a storage device
US11531487B1 (en) 2019-12-06 2022-12-20 Pure Storage, Inc. Creating a replica of a storage system
US11550514B2 (en) 2019-07-18 2023-01-10 Pure Storage, Inc. Efficient transfers between tiers of a virtual storage system
US11556416B2 (en) 2021-05-05 2023-01-17 Apple Inc. Controlling memory readout reliability and throughput by adjusting distance between read thresholds
US20230017388A1 (en) * 2021-02-05 2023-01-19 Micron Technology, Inc. Power architecture for non-volatile memory
US11561714B1 (en) 2017-07-05 2023-01-24 Pure Storage, Inc. Storage efficiency driven migration
US11573864B1 (en) 2019-09-16 2023-02-07 Pure Storage, Inc. Automating database management in a storage system
US11588716B2 (en) 2021-05-12 2023-02-21 Pure Storage, Inc. Adaptive storage processing for storage-as-a-service
US11586266B1 (en) 2021-07-28 2023-02-21 International Business Machines Corporation Persistent power enabled on-chip data processor
US11592991B2 (en) 2017-09-07 2023-02-28 Pure Storage, Inc. Converting raid data between persistent storage types
US11609718B1 (en) 2017-06-12 2023-03-21 Pure Storage, Inc. Identifying valid data after a storage system recovery
US11616834B2 (en) 2015-12-08 2023-03-28 Pure Storage, Inc. Efficient replication of a dataset to the cloud
US11620075B2 (en) 2016-11-22 2023-04-04 Pure Storage, Inc. Providing application aware storage
US11625181B1 (en) 2015-08-24 2023-04-11 Pure Storage, Inc. Data tiering using snapshots
US11630598B1 (en) 2020-04-06 2023-04-18 Pure Storage, Inc. Scheduling data replication operations
US11630585B1 (en) 2016-08-25 2023-04-18 Pure Storage, Inc. Processing evacuation events in a storage array that includes a plurality of storage devices
US11632360B1 (en) 2018-07-24 2023-04-18 Pure Storage, Inc. Remote access to a storage device
US11637896B1 (en) 2020-02-25 2023-04-25 Pure Storage, Inc. Migrating applications to a cloud-computing environment
US11650749B1 (en) 2018-12-17 2023-05-16 Pure Storage, Inc. Controlling access to sensitive data in a shared dataset
US11669386B1 (en) 2019-10-08 2023-06-06 Pure Storage, Inc. Managing an application's resource stack
US11675520B2 (en) 2017-03-10 2023-06-13 Pure Storage, Inc. Application replication among storage systems synchronously replicating a dataset
US11675503B1 (en) 2018-05-21 2023-06-13 Pure Storage, Inc. Role-based data access
US11693713B1 (en) 2019-09-04 2023-07-04 Pure Storage, Inc. Self-tuning clusters for resilient microservices
US11706895B2 (en) 2016-07-19 2023-07-18 Pure Storage, Inc. Independent scaling of compute resources and storage resources in a storage system
US11709636B1 (en) 2020-01-13 2023-07-25 Pure Storage, Inc. Non-sequential readahead for deep learning training
US11714723B2 (en) 2021-10-29 2023-08-01 Pure Storage, Inc. Coordinated snapshots for data stored across distinct storage environments
US11720497B1 (en) 2020-01-13 2023-08-08 Pure Storage, Inc. Inferred nonsequential prefetch based on data access patterns
US11733901B1 (en) 2020-01-13 2023-08-22 Pure Storage, Inc. Providing persistent storage to transient cloud computing services
US11762781B2 (en) 2017-01-09 2023-09-19 Pure Storage, Inc. Providing end-to-end encryption for data stored in a storage system
US11762764B1 (en) 2015-12-02 2023-09-19 Pure Storage, Inc. Writing data in a storage system that includes a first type of storage device and a second type of storage device
US11782614B1 (en) 2017-12-21 2023-10-10 Pure Storage, Inc. Encrypting data to optimize data reduction
US11797569B2 (en) 2019-09-13 2023-10-24 Pure Storage, Inc. Configurable data replication
US11803453B1 (en) 2017-03-10 2023-10-31 Pure Storage, Inc. Using host connectivity states to avoid queuing I/O requests
US11809727B1 (en) 2016-04-27 2023-11-07 Pure Storage, Inc. Predicting failures in a storage system that includes a plurality of storage devices
US11816129B2 (en) 2021-06-22 2023-11-14 Pure Storage, Inc. Generating datasets using approximate baselines
US11847071B2 (en) 2021-12-30 2023-12-19 Pure Storage, Inc. Enabling communication between a single-port device and multiple storage system controllers
US11847342B2 (en) 2021-07-28 2023-12-19 Apple Inc. Efficient transfer of hard data and confidence levels in reading a nonvolatile memory
US11853285B1 (en) 2021-01-22 2023-12-26 Pure Storage, Inc. Blockchain logging of volume-level events in a storage system
US11853266B2 (en) 2019-05-15 2023-12-26 Pure Storage, Inc. Providing a file system in a cloud environment
US11861423B1 (en) 2017-10-19 2024-01-02 Pure Storage, Inc. Accelerating artificial intelligence (‘AI’) workflows
US11860820B1 (en) 2018-09-11 2024-01-02 Pure Storage, Inc. Processing data through a storage system in a data pipeline
US11861221B1 (en) 2019-07-18 2024-01-02 Pure Storage, Inc. Providing scalable and reliable container-based storage services
US11861170B2 (en) 2018-03-05 2024-01-02 Pure Storage, Inc. Sizing resources for a replication target
US11860780B2 (en) 2022-01-28 2024-01-02 Pure Storage, Inc. Storage cache management
US11868622B2 (en) 2020-02-25 2024-01-09 Pure Storage, Inc. Application recovery across storage systems
US11868629B1 (en) 2017-05-05 2024-01-09 Pure Storage, Inc. Storage system sizing service
US11886922B2 (en) 2016-09-07 2024-01-30 Pure Storage, Inc. Scheduling input/output operations for a storage system
US11886295B2 (en) 2022-01-31 2024-01-30 Pure Storage, Inc. Intra-block error correction
US11893263B2 (en) 2021-10-29 2024-02-06 Pure Storage, Inc. Coordinated checkpoints among storage systems implementing checkpoint-based replication
US11914867B2 (en) 2021-10-29 2024-02-27 Pure Storage, Inc. Coordinated snapshots among storage systems implementing a promotion/demotion model
US11921908B2 (en) 2017-08-31 2024-03-05 Pure Storage, Inc. Writing data to compressed and encrypted volumes
US11921670B1 (en) 2020-04-20 2024-03-05 Pure Storage, Inc. Multivariate data backup retention policies
US11922052B2 (en) 2021-12-15 2024-03-05 Pure Storage, Inc. Managing links between storage objects
US11941279B2 (en) 2017-03-10 2024-03-26 Pure Storage, Inc. Data path virtualization
US11954238B1 (en) 2020-10-28 2024-04-09 Pure Storage, Inc. Role-based access control for a storage system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4092732A (en) * 1977-05-31 1978-05-30 International Business Machines Corporation System for recovering data stored in failed memory unit
US4722085A (en) * 1986-02-03 1988-01-26 Unisys Corp. High capacity disk storage system having unusually high fault tolerance level and bandpass
US4761785A (en) * 1986-06-12 1988-08-02 International Business Machines Corporation Parity spreading to enhance storage access
US5241508A (en) * 1991-04-03 1993-08-31 Peripheral Land, Inc. Nonvolatile ramdisk memory
US5274799A (en) * 1991-01-04 1993-12-28 Array Technology Corporation Storage device array architecture with copyback cache
US5438549A (en) * 1994-02-28 1995-08-01 Intel Corporation Nonvolatile memory with volatile memory buffer and a backup power supply system
US5519663A (en) * 1994-09-28 1996-05-21 Sci Systems, Inc. Preservation system for volatile memory with nonvolatile backup memory

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4092732A (en) * 1977-05-31 1978-05-30 International Business Machines Corporation System for recovering data stored in failed memory unit
US4722085A (en) * 1986-02-03 1988-01-26 Unisys Corp. High capacity disk storage system having unusually high fault tolerance level and bandpass
US4761785A (en) * 1986-06-12 1988-08-02 International Business Machines Corporation Parity spreading to enhance storage access
US4761785B1 (en) * 1986-06-12 1996-03-12 Ibm Parity spreading to enhance storage access
US5274799A (en) * 1991-01-04 1993-12-28 Array Technology Corporation Storage device array architecture with copyback cache
US5241508A (en) * 1991-04-03 1993-08-31 Peripheral Land, Inc. Nonvolatile ramdisk memory
US5438549A (en) * 1994-02-28 1995-08-01 Intel Corporation Nonvolatile memory with volatile memory buffer and a backup power supply system
US5519663A (en) * 1994-09-28 1996-05-21 Sci Systems, Inc. Preservation system for volatile memory with nonvolatile backup memory

Cited By (664)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050180349A1 (en) * 1997-02-06 2005-08-18 Siavash Alamouti Method for frequency division duplex communications
US9088388B2 (en) 1997-02-06 2015-07-21 At&T Mobility Ii Llc Method for frequency division duplex communications
US8693432B2 (en) 1997-02-06 2014-04-08 At&T Mobility Ii Llc Method for frequency division duplex communications
US7983217B2 (en) 1997-02-06 2011-07-19 At&T Mobility Ii Llc Method for frequency division duplex communications
US20110222526A1 (en) * 1997-02-06 2011-09-15 Siavash Alamouti Method for frequency division duplex communications
US8305990B2 (en) 1997-02-06 2012-11-06 At&T Mobility Ii Llc Method for frequency division duplex communications
US20080298339A1 (en) * 1997-02-06 2008-12-04 Siavash Alamouti Method for frequency division duplex communications
US7450542B2 (en) 1997-02-06 2008-11-11 At&T Mobility Ii Llc Method for frequency division duplex communications
US6026018A (en) * 1998-08-20 2000-02-15 Simtek Corporation Non-volatile, static random access memory with store disturb immunity
US6547147B1 (en) * 1999-02-17 2003-04-15 Denso Corporation Portable optical information reading apparatus
US6282666B1 (en) * 1999-02-26 2001-08-28 Agere Systems Guardian Corp. Computer peripheral device having the capability to wake up from a cold state with information stored before cold powerdown
US6336174B1 (en) * 1999-08-09 2002-01-01 Maxtor Corporation Hardware assisted memory backup system and method
US6496939B2 (en) 1999-09-21 2002-12-17 Bit Microsystems, Inc. Method and system for controlling data in a computer system in the event of a power failure
WO2001022205A1 (en) * 1999-09-21 2001-03-29 Bitmicro Networks, Inc. Method and system for controlling data in a computer system
US20090010080A1 (en) * 1999-11-09 2009-01-08 Fujitsu Limited Semiconductor memory device, and method of controlling the same
US8130586B2 (en) 1999-11-09 2012-03-06 Fujitsu Semiconductor Limited Semiconductor memory device and method of controlling the same
US7688661B2 (en) 1999-11-09 2010-03-30 Fujitsu Microelectronics Limited Semiconductor memory device, and method of controlling the same
US20070014178A1 (en) * 1999-11-09 2007-01-18 Fujitsu Limited Semiconductor memory device, and method of controlling the same
US20040057267A1 (en) * 1999-11-09 2004-03-25 Fujitsu Limited Semiconductor memory device, and method of controlling the same
US7869296B2 (en) 1999-11-09 2011-01-11 Fujitsu Semiconductor Limited Semiconductor memory device, and method of controlling the same
US7903487B2 (en) 1999-11-09 2011-03-08 Fujitsu Semiconductor Limited Semiconductor memory device, and method of controlling the same
US7495986B2 (en) 1999-11-09 2009-02-24 Fujitsu Microelectronic Limited Semiconductor memory device, and method of controlling the same
US20050262369A1 (en) * 1999-11-09 2005-11-24 Fujitsu Limited Semiconductor memory device, and method of controlling the same
US20070002664A1 (en) * 1999-11-09 2007-01-04 Fujitsu Limited Semiconductor memory device, and method of controlling the same
US7483323B2 (en) 1999-11-09 2009-01-27 Fujitsu Microelectronics Limited Semiconductor memory device, and method of controlling the same
US20090016142A1 (en) * 1999-11-09 2009-01-15 Fujitsu Limited Semiconductor memory device, and method of controlling the same
US6947347B2 (en) * 1999-11-09 2005-09-20 Fujitsu Limited Semiconductor memory device, and method of controlling the same
US8619487B2 (en) 1999-11-09 2013-12-31 Fujitsu Semiconductor Limited Semiconductor memory device and method of controlling the same
US6536038B1 (en) * 1999-11-29 2003-03-18 Intel Corporation Dynamic update of non-upgradeable memory
US6629248B1 (en) * 2000-03-30 2003-09-30 Intel Corporation Apparatus and method for maintaining a security association for manageability across power failures
US20010051519A1 (en) * 2000-06-12 2001-12-13 Kouji Shirai Portable telephone set
US7181198B2 (en) * 2000-06-12 2007-02-20 Nec Corporation Program rewriting system and method for a portable telephone set
US8140872B1 (en) 2000-06-16 2012-03-20 Marc Fleischmann Restoring processor context in response to processor power-up
US7730330B1 (en) 2000-06-16 2010-06-01 Marc Fleischmann System and method for saving and restoring a processor state without executing any instructions from a first instruction set
US20070288677A1 (en) * 2000-07-06 2007-12-13 Onspec Electronic, Inc. Field-Operable, Stand-Alone Apparatus for Media Recovery and Regeneration
US8011964B2 (en) 2000-07-06 2011-09-06 Mcm Portfolio Llc Smartconnect flash card adapter
US8337252B2 (en) 2000-07-06 2012-12-25 Mcm Portfolio Llc Smartconnect flash card adapter
US7719847B2 (en) 2000-07-06 2010-05-18 Mcm Portfolio Llc Smartconnect flash card adapter
US7620844B2 (en) * 2000-07-06 2009-11-17 Mcm Portfolio Llc Field-operable, stand-alone apparatus for media recovery and regeneration
US7597268B2 (en) 2000-07-06 2009-10-06 Mcm Portfolio Llc Memory module which includes a form factor connector
US9558135B2 (en) 2000-07-06 2017-01-31 Larry Lawson Jones Flashcard reader and converter for reading serial and parallel flashcards
US20080299809A1 (en) * 2000-07-06 2008-12-04 Mcm Portfolio Llc Smartconnect flash card adapter
US20100195290A1 (en) * 2000-07-06 2010-08-05 Mcm Portfolio Llc Smartconnect Flash Card Adapter
US7397707B2 (en) 2000-09-14 2008-07-08 Sandisk Corporation Compressed event counting technique and application to a flash memory system
US20030196031A1 (en) * 2000-10-30 2003-10-16 Chen Jack Yajie Storage controller with the disk drive and the RAM in a hybrid architecture
US7047356B2 (en) * 2000-10-30 2006-05-16 Jack Yajie Chen Storage controller with the disk drive and the RAM in a hybrid architecture
WO2002086721A1 (en) * 2001-04-19 2002-10-31 International Business Machines Corporation Method and apparatus for improving reliability of write back cache information
GB2391095A (en) * 2001-04-19 2004-01-28 Ibm Method and apparatus for improving reliability of write back cache information
US6556477B2 (en) 2001-05-21 2003-04-29 Ibm Corporation Integrated chip having SRAM, DRAM and flash memory and method for fabricating the same
EP1267357A3 (en) * 2001-06-07 2004-10-13 Ahrens & Birner Company GmbH Method and apparatus containing S-RAM portions of different access speed for reliable data retaining
EP1267357A2 (en) * 2001-06-07 2002-12-18 Ahrens & Birner Company GmbH Method and apparatus containing S-RAM portions of different access speed for reliable data retaining
US6670234B2 (en) 2001-06-22 2003-12-30 International Business Machines Corporation Method of integrating volatile and non-volatile memory cells on the same substrate and a semiconductor memory device thereof
EP1449161A1 (en) * 2001-08-24 2004-08-25 United Parcel Service Of America, Inc. Portable data acquisition and management system and associated device and method
US7116578B2 (en) * 2001-09-12 2006-10-03 Renesas Technology Corp. Non-volatile memory device and data storing method
US20040174742A1 (en) * 2001-09-12 2004-09-09 Renesas Technology Corp. Non-volatile memory device and data storing method
US7487316B1 (en) * 2001-09-17 2009-02-03 Rockwell Automation Technologies, Inc. Archive and restore system and methodology for on-line edits utilizing non-volatile buffering
US8433941B2 (en) * 2001-10-03 2013-04-30 Hewlett-Packard Deveolpment Company, L.P. Information preservation on a portable electronic device
US6693840B2 (en) * 2001-10-17 2004-02-17 Matsushita Electric Industrial Co., Ltd. Non-volatile semiconductor memory device with enhanced erase/write cycle endurance
US6822346B2 (en) * 2002-01-29 2004-11-23 Rockwell Automation Technologies, Inc. Battery backed memory with battery disconnect for improved battery life
US6888267B2 (en) * 2002-01-29 2005-05-03 Rockwell Automation Technologies, Inc. Battery backed memory with low battery voltage trip, disconnect and lockout
US20030142573A1 (en) * 2002-01-29 2003-07-31 Floro William Edward Battery backed memory with low battery voltage trip, disconnect and lockout
WO2003091964A1 (en) * 2002-04-24 2003-11-06 Schlumbergersema Inc. Method of using flash memory for storing metering data
US20050036387A1 (en) * 2002-04-24 2005-02-17 Seal Brian K. Method of using flash memory for storing metering data
US20040093137A1 (en) * 2002-10-21 2004-05-13 Denso Corporation Electronic control unit for controlling updating of data in non-volatile memory
US7203581B2 (en) * 2002-10-21 2007-04-10 Denso Corporation Electronic control unit for controlling updating of data in non-volatile memory
US7003620B2 (en) * 2002-11-26 2006-02-21 M-Systems Flash Disk Pioneers Ltd. Appliance, including a flash memory, that is robust under power failure
US20040103238A1 (en) * 2002-11-26 2004-05-27 M-Systems Flash Disk Pioneers Ltd. Appliance, including a flash memory, that is robust under power failure
US20050132150A1 (en) * 2003-08-28 2005-06-16 International Business Machines Corp. Data storage systems
US8397012B2 (en) * 2003-08-28 2013-03-12 International Business Machines Corporation Data storage systems
US20060072369A1 (en) * 2004-10-04 2006-04-06 Research In Motion Limited System and method for automatically saving memory contents of a data processing device on power failure
US7634688B2 (en) * 2004-10-04 2009-12-15 Research In Motion Limited System and method for automatically saving memory contents of a data processing device on power failure
US20060080515A1 (en) * 2004-10-12 2006-04-13 Lefthand Networks, Inc. Non-Volatile Memory Backup for Network Storage System
US7818477B2 (en) * 2005-03-28 2010-10-19 Panasonic Corporation Storage device with buffer control unit
US20090019194A1 (en) * 2005-03-28 2009-01-15 Matsushita Electric Industrial Co., Ltd. Storage device
US8072834B2 (en) 2005-08-25 2011-12-06 Cypress Semiconductor Corporation Line driver circuit and method with standby mode of operation
US7986480B2 (en) * 2005-11-03 2011-07-26 Hitachi Global Storage Technologies Netherlands B.V. Micro-journaling of data on a storage device
US20070101056A1 (en) * 2005-11-03 2007-05-03 Colegrove Daniel J Micro-journaling of data on a storage device
US20070097535A1 (en) * 2005-11-03 2007-05-03 Colegrove Daniel J Micro-journaling of data on a storage device
US7725666B2 (en) 2005-11-03 2010-05-25 Hitachi Global Storage Technologies Netherlands B.V. Micro-journaling of data on a storage device
US20070220227A1 (en) * 2006-03-17 2007-09-20 Emc Corporation Techniques for managing data within a data storage system utilizing a flash-based memory vault
WO2007108840A1 (en) * 2006-03-17 2007-09-27 Emc Corporation Techniques for managing data within a data storage system utilizing a flash-based memory vault
US7421552B2 (en) 2006-03-17 2008-09-02 Emc Corporation Techniques for managing data within a data storage system utilizing a flash-based memory vault
US8239735B2 (en) 2006-05-12 2012-08-07 Apple Inc. Memory Device with adaptive capacity
US8570804B2 (en) 2006-05-12 2013-10-29 Apple Inc. Distortion estimation and cancellation in memory devices
US8599611B2 (en) 2006-05-12 2013-12-03 Apple Inc. Distortion estimation and cancellation in memory devices
US8156403B2 (en) 2006-05-12 2012-04-10 Anobit Technologies Ltd. Combined distortion estimation and error correction coding for memory devices
US20080061403A1 (en) * 2006-09-08 2008-03-13 Zhong-Xiang He Dielectric layers for metal lines in semiconductor chips
US20080088482A1 (en) * 2006-10-15 2008-04-17 Fujitsu Ten Limited Vehicle information recording apparatus
USRE46346E1 (en) 2006-10-30 2017-03-21 Apple Inc. Reading memory cells using multiple thresholds
US8145984B2 (en) 2006-10-30 2012-03-27 Anobit Technologies Ltd. Reading memory cells using multiple thresholds
US20080112223A1 (en) * 2006-11-13 2008-05-15 Giacobbe Mark C Method and apparatus for collecting data related to the status of an electrical power system
US7463527B2 (en) * 2006-11-13 2008-12-09 Abb Technology Ag Method and apparatus for collecting data related to the status of an electrical power system
US8151163B2 (en) 2006-12-03 2012-04-03 Anobit Technologies Ltd. Automatic defect management in memory devices
US11573909B2 (en) 2006-12-06 2023-02-07 Unification Technologies Llc Apparatus, system, and method for managing commands of solid-state storage using bank interleave
US11640359B2 (en) 2006-12-06 2023-05-02 Unification Technologies Llc Systems and methods for identifying storage resources that are not in use
US9734086B2 (en) 2006-12-06 2017-08-15 Sandisk Technologies Llc Apparatus, system, and method for a device shared between multiple independent hosts
US11847066B2 (en) 2006-12-06 2023-12-19 Unification Technologies Llc Apparatus, system, and method for managing commands of solid-state storage using bank interleave
US8315096B2 (en) 2006-12-22 2012-11-20 Cypress Semiconductor Corporation Method and apparatus to implement a reset function in a non-volatile static random access memory
US8151166B2 (en) 2007-01-24 2012-04-03 Anobit Technologies Ltd. Reduction of back pattern dependency effects in memory devices
US8369141B2 (en) 2007-03-12 2013-02-05 Apple Inc. Adaptive estimation of memory cell read thresholds
US7908504B2 (en) * 2007-03-23 2011-03-15 Michael Feldman Smart batteryless backup device and method therefor
US20080235471A1 (en) * 2007-03-23 2008-09-25 Michael Feldman Smart batteryless backup device and method therefor
US8429493B2 (en) 2007-05-12 2013-04-23 Apple Inc. Memory device with internal signap processing unit
US8234545B2 (en) 2007-05-12 2012-07-31 Apple Inc. Data storage with incremental redundancy
US20100131827A1 (en) * 2007-05-12 2010-05-27 Anobit Technologies Ltd Memory device with internal signap processing unit
US11232054B2 (en) 2007-06-01 2022-01-25 Netlist, Inc. Flash-dram hybrid memory module
US9921762B2 (en) * 2007-06-01 2018-03-20 Netlist, Inc. Redundant backup using non-volatile memory
US20150248249A1 (en) * 2007-06-01 2015-09-03 Netlist, Inc. Redundant backup using non-volatile memory
US9928186B2 (en) 2007-06-01 2018-03-27 Netlist, Inc. Flash-DRAM hybrid memory module
US11016918B2 (en) 2007-06-01 2021-05-25 Netlist, Inc. Flash-DRAM hybrid memory module
US8046546B2 (en) 2007-07-25 2011-10-25 AGIGA Tech Variable partitioning in a hybrid memory subsystem
US7865679B2 (en) 2007-07-25 2011-01-04 AgigA Tech Inc., 12700 Power interrupt recovery in a hybrid memory subsystem
US20090031072A1 (en) * 2007-07-25 2009-01-29 Simtek Hybrid nonvolatile RAM
US8074034B2 (en) 2007-07-25 2011-12-06 Agiga Tech Inc. Hybrid nonvolatile ram
US8154259B2 (en) 2007-07-25 2012-04-10 Agiga Tech Inc. Capacitor save energy verification
US20090031099A1 (en) * 2007-07-25 2009-01-29 Simtek Power interrupt recovery in a hybrid memory subsystem
US20090027014A1 (en) * 2007-07-25 2009-01-29 Simtek Capacitor save energy verification
US8650363B2 (en) 2007-07-25 2014-02-11 AGIGA Tech Capacitor save energy verification
US20090031098A1 (en) * 2007-07-25 2009-01-29 Simtek Variable partitioning in a hybrid memory subsystem
US8259497B2 (en) 2007-08-06 2012-09-04 Apple Inc. Programming schemes for multi-level analog memory cells
US20090043951A1 (en) * 2007-08-06 2009-02-12 Anobit Technologies Ltd. Programming schemes for multi-level analog memory cells
US8174905B2 (en) 2007-09-19 2012-05-08 Anobit Technologies Ltd. Programming orders for reducing distortion in arrays of multi-level analog memory cells
US8527819B2 (en) 2007-10-19 2013-09-03 Apple Inc. Data storage in analog memory cell arrays having erase failures
US8270246B2 (en) 2007-11-13 2012-09-18 Apple Inc. Optimized selection of memory chips in multi-chips memory devices
US10120586B1 (en) 2007-11-16 2018-11-06 Bitmicro, Llc Memory transaction with reduced latency
US8225181B2 (en) 2007-11-30 2012-07-17 Apple Inc. Efficient re-read operations from memory devices
US20090144600A1 (en) * 2007-11-30 2009-06-04 Anobit Technologies Ltd Efficient re-read operations from memory devices
US9600184B2 (en) 2007-12-06 2017-03-21 Sandisk Technologies Llc Apparatus, system, and method for coordinating storage requests in a multi-processor/multi-thread environment
US8209588B2 (en) 2007-12-12 2012-06-26 Anobit Technologies Ltd. Efficient interference cancellation in analog memory cell arrays
US20090157964A1 (en) * 2007-12-16 2009-06-18 Anobit Technologies Ltd. Efficient data storage in multi-plane memory devices
US20090172425A1 (en) * 2007-12-31 2009-07-02 Simtek Digitally controlled dynamic power management unit for uninterruptible power supply
US8838918B2 (en) * 2008-02-01 2014-09-16 Fujitsu Limited Information processing apparatus and data backup method
US20090198931A1 (en) * 2008-02-01 2009-08-06 Fujitsu Limited Information processing apparatus and data backup method
US8156398B2 (en) 2008-02-05 2012-04-10 Anobit Technologies Ltd. Parameter estimation based on error correction code parity check equations
US8230300B2 (en) 2008-03-07 2012-07-24 Apple Inc. Efficient readout from analog memory cells using data compression
US8400858B2 (en) 2008-03-18 2013-03-19 Apple Inc. Memory device with reduced sense time readout
US8493783B2 (en) 2008-03-18 2013-07-23 Apple Inc. Memory device readout using multiple sense times
US20130145085A1 (en) * 2008-06-18 2013-06-06 Super Talent Technology Corp. Virtual Memory Device (VMD) Application/Driver with Dual-Level Interception for Data-Type Splitting, Meta-Page Grouping, and Diversion of Temp Files to Ramdisks for Enhanced Flash Endurance
US8954654B2 (en) * 2008-06-18 2015-02-10 Super Talent Technology, Corp. Virtual memory device (VMD) application/driver with dual-level interception for data-type splitting, meta-page grouping, and diversion of temp files to ramdisks for enhanced flash endurance
US9842628B2 (en) 2008-07-10 2017-12-12 Agiga Tech Inc. Capacitor enablement voltage level adjustment method and apparatus
US10134451B1 (en) 2008-07-10 2018-11-20 Agiga Tech Inc Adaptive training and adjustment to changing capacitor values based upon age and usage behavior
US20100008174A1 (en) * 2008-07-10 2010-01-14 Agiga Tech Inc. Adaptive training and adjustment to changing capacitor values based upon age and usage behavior
US10971227B2 (en) * 2008-07-31 2021-04-06 Unity Semiconductor Corporation Preservation circuit and methods to maintain values representing data in one or more layers of memory
US20180182454A1 (en) * 2008-07-31 2018-06-28 Unity Semiconductor Corporation Preservation circuit and methods to maintain values representing data in one or more layers of memory
US20200118625A1 (en) * 2008-07-31 2020-04-16 Unity Semiconductor Corporation Preservation circuit and methods to maintain values representing data in one or more layers of memory
US10453525B2 (en) * 2008-07-31 2019-10-22 Unity Semiconductor Corporation Preservation circuit and methods to maintain values representing data in one or more layers of memory
US8498151B1 (en) 2008-08-05 2013-07-30 Apple Inc. Data storage in analog memory cells using modified pass voltages
US8169825B1 (en) * 2008-09-02 2012-05-01 Anobit Technologies Ltd. Reliable data storage in analog memory cells subjected to long retention periods
US8949684B1 (en) 2008-09-02 2015-02-03 Apple Inc. Segmented data storage
US8482978B1 (en) 2008-09-14 2013-07-09 Apple Inc. Estimation of memory cell read thresholds by sampling inside programming level distribution intervals
US8239734B1 (en) 2008-10-15 2012-08-07 Apple Inc. Efficient data storage in storage device arrays
US8261159B1 (en) 2008-10-30 2012-09-04 Apple, Inc. Data scrambling schemes for memory devices
US8713330B1 (en) 2008-10-30 2014-04-29 Apple Inc. Data scrambling in memory devices
US8208304B2 (en) 2008-11-16 2012-06-26 Anobit Technologies Ltd. Storage at M bits/cell density in N bits/cell analog memory cell devices, M>N
US8374014B2 (en) 2008-12-31 2013-02-12 Apple Inc. Rejuvenation of analog memory cells
US8397131B1 (en) 2008-12-31 2013-03-12 Apple Inc. Efficient readout schemes for analog memory cell devices
US8174857B1 (en) 2008-12-31 2012-05-08 Anobit Technologies Ltd. Efficient readout schemes for analog memory cell devices using multiple read threshold sets
US8248831B2 (en) 2008-12-31 2012-08-21 Apple Inc. Rejuvenation of analog memory cells
US8924661B1 (en) 2009-01-18 2014-12-30 Apple Inc. Memory system including a controller and processors associated with memory devices
US20100205348A1 (en) * 2009-02-11 2010-08-12 Stec, Inc Flash backed dram module storing parameter information of the dram module in the flash
US7983107B2 (en) * 2009-02-11 2011-07-19 Stec, Inc. Flash backed DRAM module with a selectable number of flash chips
US20100202237A1 (en) * 2009-02-11 2010-08-12 Stec, Inc. Flash backed dram module with a selectable number of flash chips
US7830732B2 (en) 2009-02-11 2010-11-09 Stec, Inc. Staged-backup flash backed dram module
WO2010093356A1 (en) * 2009-02-11 2010-08-19 Stec, Inc. A flash backed dram module
US8977831B2 (en) * 2009-02-11 2015-03-10 Stec, Inc. Flash backed DRAM module storing parameter information of the DRAM module in the flash
US20100202240A1 (en) * 2009-02-11 2010-08-12 Stec, Inc. State of health monitored flash backed dram module
US8566639B2 (en) * 2009-02-11 2013-10-22 Stec, Inc. Flash backed DRAM module with state of health and/or status information accessible through a configuration data bus
US20100202239A1 (en) * 2009-02-11 2010-08-12 Stec, Inc. Staged-backup flash backed dram module
US20100202238A1 (en) * 2009-02-11 2010-08-12 Stec, Inc. Flash backed dram module including logic for isolating the dram
US20100205349A1 (en) * 2009-02-11 2010-08-12 Stec, Inc. Segmented-memory flash backed dram module
US7990797B2 (en) * 2009-02-11 2011-08-02 Stec, Inc. State of health monitored flash backed dram module
US8169839B2 (en) * 2009-02-11 2012-05-01 Stec, Inc. Flash backed DRAM module including logic for isolating the DRAM
US20100205470A1 (en) * 2009-02-11 2010-08-12 Stec, Inc. Flash backed dram module with state of health and/or status information accessible through a configuration data bus
US9520191B2 (en) * 2009-02-11 2016-12-13 Hgst Technologies Santa Ana, Inc. Apparatus, systems, and methods for operating flash backed DRAM module
US8228701B2 (en) 2009-03-01 2012-07-24 Apple Inc. Selective activation of programming schemes in analog memory cell arrays
US20100220509A1 (en) * 2009-03-01 2010-09-02 Anobit Technologies Ltd Selective Activation of Programming Schemes in Analog Memory Cell Arrays
US8259506B1 (en) 2009-03-25 2012-09-04 Apple Inc. Database of memory read thresholds
US8832354B2 (en) 2009-03-25 2014-09-09 Apple Inc. Use of host system resources by memory controller
US8238157B1 (en) 2009-04-12 2012-08-07 Apple Inc. Selective re-programming of analog memory cells
US20110010499A1 (en) * 2009-07-09 2011-01-13 Fujitsu Limited Storage system, method of controlling storage system, and method of controlling control apparatus
US8479080B1 (en) 2009-07-12 2013-07-02 Apple Inc. Adaptive over-provisioning in memory systems
US10149399B1 (en) 2009-09-04 2018-12-04 Bitmicro Llc Solid state drive with improved enclosure assembly
US10133686B2 (en) 2009-09-07 2018-11-20 Bitmicro Llc Multilevel memory bus system
US9223514B2 (en) 2009-09-09 2015-12-29 SanDisk Technologies, Inc. Erase suspend/resume for memory
US8972627B2 (en) 2009-09-09 2015-03-03 Fusion-Io, Inc. Apparatus, system, and method for managing operations for data storage media
US8289801B2 (en) 2009-09-09 2012-10-16 Fusion-Io, Inc. Apparatus, system, and method for power reduction management in a storage device
US20110060927A1 (en) * 2009-09-09 2011-03-10 Fusion-Io, Inc. Apparatus, system, and method for power reduction in a storage device
US9021158B2 (en) 2009-09-09 2015-04-28 SanDisk Technologies, Inc. Program suspend/resume for memory
US20110058440A1 (en) * 2009-09-09 2011-03-10 Fusion-Io, Inc. Apparatus, system, and method for power reduction management in a storage device
US8429436B2 (en) 2009-09-09 2013-04-23 Fusion-Io, Inc. Apparatus, system, and method for power reduction in a storage device
US9305610B2 (en) 2009-09-09 2016-04-05 SanDisk Technologies, Inc. Apparatus, system, and method for power reduction management in a storage device
US9484103B1 (en) * 2009-09-14 2016-11-01 Bitmicro Networks, Inc. Electronic storage device
US9099187B2 (en) 2009-09-14 2015-08-04 Bitmicro Networks, Inc. Reducing erase cycles in an electronic storage device that uses at least one erase-limited memory device
US10082966B1 (en) 2009-09-14 2018-09-25 Bitmicro Llc Electronic storage device
US20110072290A1 (en) * 2009-09-24 2011-03-24 Xyratex Technology Limited Auxiliary power supply, a method of providing power to a data storage system and a back-up power supply charging circuit
US8868957B2 (en) 2009-09-24 2014-10-21 Xyratex Technology Limited Auxiliary power supply, a method of providing power to a data storage system and a back-up power supply charging circuit
US8495465B1 (en) 2009-10-15 2013-07-23 Apple Inc. Error correction coding over multiple memory pages
US8677054B1 (en) 2009-12-16 2014-03-18 Apple Inc. Memory management schemes for non-volatile memory devices
US8694814B1 (en) 2010-01-10 2014-04-08 Apple Inc. Reuse of host hibernation storage space by memory controller
US8677203B1 (en) 2010-01-11 2014-03-18 Apple Inc. Redundant data storage schemes for multi-die memory systems
US8572311B1 (en) 2010-01-11 2013-10-29 Apple Inc. Redundant data storage in multi-die memory systems
US8694853B1 (en) 2010-05-04 2014-04-08 Apple Inc. Read commands for reading interfering memory cells
US8572423B1 (en) 2010-06-22 2013-10-29 Apple Inc. Reducing peak current in memory systems
US8595591B1 (en) 2010-07-11 2013-11-26 Apple Inc. Interference-aware assignment of programming levels in analog memory cells
US9104580B1 (en) 2010-07-27 2015-08-11 Apple Inc. Cache memory for hybrid disk drives
US8645794B1 (en) 2010-07-31 2014-02-04 Apple Inc. Data storage in analog memory cells using a non-integer number of bits per cell
US8767459B1 (en) 2010-07-31 2014-07-01 Apple Inc. Data storage in analog memory cells across word lines using a non-integer number of bits per cell
US8856475B1 (en) 2010-08-01 2014-10-07 Apple Inc. Efficient selection of memory blocks for compaction
US8493781B1 (en) 2010-08-12 2013-07-23 Apple Inc. Interference mitigation using individual word line erasure operations
US8694854B1 (en) 2010-08-17 2014-04-08 Apple Inc. Read threshold setting based on soft readout statistics
US8984216B2 (en) 2010-09-09 2015-03-17 Fusion-Io, Llc Apparatus, system, and method for managing lifetime of a storage device
US9021181B1 (en) 2010-09-27 2015-04-28 Apple Inc. Memory management for unifying memory cell conditions by using maximum time intervals
US8527693B2 (en) 2010-12-13 2013-09-03 Fusion IO, Inc. Apparatus, system, and method for auto-commit memory
US9772938B2 (en) 2010-12-13 2017-09-26 Sandisk Technologies Llc Auto-commit memory metadata and resetting the metadata by writing to special address in free space of page storing the metadata
US9047178B2 (en) 2010-12-13 2015-06-02 SanDisk Technologies, Inc. Auto-commit memory synchronization
US10817421B2 (en) 2010-12-13 2020-10-27 Sandisk Technologies Llc Persistent data structures
US9767017B2 (en) 2010-12-13 2017-09-19 Sandisk Technologies Llc Memory device with volatile and non-volatile media
US9223662B2 (en) 2010-12-13 2015-12-29 SanDisk Technologies, Inc. Preserving data of a volatile memory
US10817502B2 (en) 2010-12-13 2020-10-27 Sandisk Technologies Llc Persistent memory management
US9208071B2 (en) 2010-12-13 2015-12-08 SanDisk Technologies, Inc. Apparatus, system, and method for accessing memory
US9218278B2 (en) 2010-12-13 2015-12-22 SanDisk Technologies, Inc. Auto-commit memory
US8468317B2 (en) 2011-06-07 2013-06-18 Agiga Tech Inc. Apparatus and method for improved data restore in a memory system
US9372755B1 (en) 2011-10-05 2016-06-21 Bitmicro Networks, Inc. Adaptive power cycle sequences for data recovery
US10180887B1 (en) 2011-10-05 2019-01-15 Bitmicro Llc Adaptive power cycle sequences for data recovery
US9684520B2 (en) 2011-10-20 2017-06-20 Smart Modular Technologies, Inc. Computing system with non-disruptive fast memory restore mechanism and method of operation thereof
US9098270B1 (en) 2011-11-01 2015-08-04 Cypress Semiconductor Corporation Device and method of establishing sleep mode architecture for NVSRAMs
US9754634B2 (en) 2011-11-23 2017-09-05 Smart Modular Technologies, Inc. Memory management system with power source and method of manufacture thereof
WO2013165385A1 (en) * 2012-04-30 2013-11-07 Hewlett-Packard Development Company, L.P. Preventing a hybrid memory module from being mapped
US9043669B1 (en) 2012-05-18 2015-05-26 Bitmicro Networks, Inc. Distributed ECC engine for storage media
US9996419B1 (en) 2012-05-18 2018-06-12 Bitmicro Llc Storage system with distributed ECC capability
US10289545B2 (en) 2012-06-12 2019-05-14 Sandisk Technologies Llc Hybrid checkpointed memory
US9678863B2 (en) 2012-06-12 2017-06-13 Sandisk Technologies, Llc Hybrid checkpointed memory
US9779016B1 (en) 2012-07-25 2017-10-03 Smart Modular Technologies, Inc. Computing system with backup and recovery mechanism and method of operation thereof
US9141505B1 (en) * 2012-09-27 2015-09-22 Emc Corporation Adaptive failure survivability in a storage system using save time and data transfer after power loss
US9753828B1 (en) * 2012-09-27 2017-09-05 EMC IP Holding Company LLC Adaptive failure survivability in a storage system utilizing save time and data transfer upon power loss
CN103488578A (en) * 2012-12-28 2014-01-01 晶天电子(深圳)有限公司 Vmd application/driver
CN103488578B (en) * 2012-12-28 2016-05-25 晶天电子(深圳)有限公司 Virtual memory facilities (VMD) application/driver
TWI506431B (en) * 2012-12-28 2015-11-01 Infomicro Electronics Shenzhen Ltd Virtual memory device (vmd) application/driver with dual-level interception for data-type splitting, meta-page grouping, and diversion of temp files to ramdisks for enhanced flash endurance
US9348539B1 (en) * 2013-03-12 2016-05-24 Inphi Corporation Memory centric computing
US9977077B1 (en) 2013-03-14 2018-05-22 Bitmicro Llc Self-test solution for delay locked loops
US9423457B2 (en) 2013-03-14 2016-08-23 Bitmicro Networks, Inc. Self-test solution for delay locked loops
US9934160B1 (en) 2013-03-15 2018-04-03 Bitmicro Llc Bit-mapped DMA and IOC transfer with dependency table comprising plurality of index fields in the cache for DMA transfer
US9720603B1 (en) 2013-03-15 2017-08-01 Bitmicro Networks, Inc. IOC to IOC distributed caching architecture
US9842024B1 (en) 2013-03-15 2017-12-12 Bitmicro Networks, Inc. Flash electronic disk with RAID controller
US10042799B1 (en) 2013-03-15 2018-08-07 Bitmicro, Llc Bit-mapped DMA transfer with dependency table configured to monitor status so that a processor is not rendered as a bottleneck in a system
US9858084B2 (en) 2013-03-15 2018-01-02 Bitmicro Networks, Inc. Copying of power-on reset sequencer descriptor from nonvolatile memory to random access memory
US9875205B1 (en) 2013-03-15 2018-01-23 Bitmicro Networks, Inc. Network of memory systems
US9430386B2 (en) 2013-03-15 2016-08-30 Bitmicro Networks, Inc. Multi-leveled cache management in a hybrid storage system
US10013373B1 (en) 2013-03-15 2018-07-03 Bitmicro Networks, Inc. Multi-level message passing descriptor
US9798688B1 (en) 2013-03-15 2017-10-24 Bitmicro Networks, Inc. Bus arbitration with routing and failover mechanism
US10210084B1 (en) 2013-03-15 2019-02-19 Bitmicro Llc Multi-leveled cache management in a hybrid storage system
US9734067B1 (en) 2013-03-15 2017-08-15 Bitmicro Networks, Inc. Write buffering
US9971524B1 (en) 2013-03-15 2018-05-15 Bitmicro Networks, Inc. Scatter-gather approach for parallel data transfer in a mass storage system
US9916213B1 (en) 2013-03-15 2018-03-13 Bitmicro Networks, Inc. Bus arbitration with routing and failover mechanism
US9501436B1 (en) 2013-03-15 2016-11-22 Bitmicro Networks, Inc. Multi-level message passing descriptor
US10489318B1 (en) 2013-03-15 2019-11-26 Bitmicro Networks, Inc. Scatter-gather approach for parallel data transfer in a mass storage system
US10120694B2 (en) 2013-03-15 2018-11-06 Bitmicro Networks, Inc. Embedded system boot from a storage device
US9400617B2 (en) 2013-03-15 2016-07-26 Bitmicro Networks, Inc. Hardware-assisted DMA transfer with dependency table configured to permit-in parallel-data drain from cache without processor intervention when filled or drained
US10423554B1 (en) 2013-03-15 2019-09-24 Bitmicro Networks, Inc Bus arbitration with routing and failover mechanism
US9934045B1 (en) 2013-03-15 2018-04-03 Bitmicro Networks, Inc. Embedded system boot from a storage device
US9672178B1 (en) 2013-03-15 2017-06-06 Bitmicro Networks, Inc. Bit-mapped DMA transfer with dependency table configured to monitor status so that a processor is not rendered as a bottleneck in a system
US8922721B2 (en) 2013-03-15 2014-12-30 Samsung Electronics Co., Ltd. Display apparatus and control method thereof
US11314422B2 (en) 2013-06-11 2022-04-26 Netlist, Inc. Non-volatile memory storage for multi-channel memory system
US10719246B2 (en) 2013-06-11 2020-07-21 Netlist, Inc. Non-volatile memory storage for multi-channel memory system
US9996284B2 (en) 2013-06-11 2018-06-12 Netlist, Inc. Non-volatile memory storage for multi-channel memory system
US9666244B2 (en) 2014-03-01 2017-05-30 Fusion-Io, Inc. Dividing a storage procedure
US10042792B1 (en) 2014-04-17 2018-08-07 Bitmicro Networks, Inc. Method for transferring and receiving frames across PCI express bus for SSD device
US9952991B1 (en) 2014-04-17 2018-04-24 Bitmicro Networks, Inc. Systematic method on queuing of descriptors for multiple flash intelligent DMA engine operation
US9811461B1 (en) 2014-04-17 2017-11-07 Bitmicro Networks, Inc. Data storage system
US10025736B1 (en) 2014-04-17 2018-07-17 Bitmicro Networks, Inc. Exchange message protocol message transmission between two devices
US10078604B1 (en) 2014-04-17 2018-09-18 Bitmicro Networks, Inc. Interrupt coalescing
US10055150B1 (en) 2014-04-17 2018-08-21 Bitmicro Networks, Inc. Writing volatile scattered memory metadata to flash device
US9696918B2 (en) 2014-07-13 2017-07-04 Apple Inc. Protection and recovery from sudden power failure in non-volatile memory devices
US9933950B2 (en) 2015-01-16 2018-04-03 Sandisk Technologies Llc Storage operation interrupt
US20190034098A1 (en) * 2015-03-30 2019-01-31 Toshiba Memory Corporation Solid-state drive with non-volatile random access memory
US10824344B2 (en) * 2015-03-30 2020-11-03 Toshiba Memory Corporation Solid-state drive with non-volatile random access memory
US10009438B2 (en) 2015-05-20 2018-06-26 Sandisk Technologies Llc Transaction log acceleration
US10834224B2 (en) 2015-05-20 2020-11-10 Sandisk Technologies Llc Transaction log acceleration
US11102298B1 (en) 2015-05-26 2021-08-24 Pure Storage, Inc. Locally providing cloud storage services for fleet management
US10027757B1 (en) 2015-05-26 2018-07-17 Pure Storage, Inc. Locally providing cloud storage array services
US10652331B1 (en) 2015-05-26 2020-05-12 Pure Storage, Inc. Locally providing highly available cloud-based storage system services
US9716755B2 (en) 2015-05-26 2017-07-25 Pure Storage, Inc. Providing cloud storage array services by a local storage array in a data center
US11711426B2 (en) 2015-05-26 2023-07-25 Pure Storage, Inc. Providing storage resources from a storage pool
US9594678B1 (en) 2015-05-27 2017-03-14 Pure Storage, Inc. Preventing duplicate entries of identical data in a storage device
US10761759B1 (en) 2015-05-27 2020-09-01 Pure Storage, Inc. Deduplication of data in a storage device
US11921633B2 (en) 2015-05-27 2024-03-05 Pure Storage, Inc. Deduplicating data based on recently reading the data
US11360682B1 (en) 2015-05-27 2022-06-14 Pure Storage, Inc. Identifying duplicative write data in a storage system
US11201913B1 (en) 2015-05-29 2021-12-14 Pure Storage, Inc. Cloud-based authentication of a storage system user
US11936654B2 (en) 2015-05-29 2024-03-19 Pure Storage, Inc. Cloud-based user authorization control for storage system access
US11936719B2 (en) 2015-05-29 2024-03-19 Pure Storage, Inc. Using cloud services to provide secure access to a storage system
US9882913B1 (en) 2015-05-29 2018-01-30 Pure Storage, Inc. Delivering authorization and authentication for a user of a storage array from a cloud
WO2016195961A1 (en) * 2015-05-29 2016-12-08 Pure Storage, Inc. Buffering data to be written to an array of non-volatile storage devices
US10021170B2 (en) 2015-05-29 2018-07-10 Pure Storage, Inc. Managing a storage array using client-side services
US10560517B1 (en) 2015-05-29 2020-02-11 Pure Storage, Inc. Remote management of a storage array
US11503031B1 (en) 2015-05-29 2022-11-15 Pure Storage, Inc. Storage array access control from cloud-based user authorization and authentication
US10834086B1 (en) 2015-05-29 2020-11-10 Pure Storage, Inc. Hybrid cloud-based authentication for flash storage array access
US11868625B2 (en) 2015-06-10 2024-01-09 Pure Storage, Inc. Alert tracking in storage
US11137918B1 (en) 2015-06-10 2021-10-05 Pure Storage, Inc. Administration of control information in a storage system
US10318196B1 (en) 2015-06-10 2019-06-11 Pure Storage, Inc. Stateless storage system controller in a direct flash storage system
US10866744B1 (en) 2015-06-19 2020-12-15 Pure Storage, Inc. Determining capacity utilization in a deduplicating storage system
US10310753B1 (en) 2015-06-19 2019-06-04 Pure Storage, Inc. Capacity attribution in a storage system
US9389665B1 (en) * 2015-06-19 2016-07-12 Rockwell Collins, Inc. Power warning monitor system and method
US9594512B1 (en) 2015-06-19 2017-03-14 Pure Storage, Inc. Attributing consumed storage capacity among entities storing data in a storage array
US10082971B1 (en) 2015-06-19 2018-09-25 Pure Storage, Inc. Calculating capacity utilization in a storage system
US11586359B1 (en) 2015-06-19 2023-02-21 Pure Storage, Inc. Tracking storage consumption in a storage array
US9804779B1 (en) 2015-06-19 2017-10-31 Pure Storage, Inc. Determining storage capacity to be made available upon deletion of a shared data object
US10310740B2 (en) 2015-06-23 2019-06-04 Pure Storage, Inc. Aligning memory access operations to a geometry of a storage device
US10296236B2 (en) 2015-07-01 2019-05-21 Pure Storage, Inc. Offloading device management responsibilities from a storage device in an array of storage devices
US11385801B1 (en) 2015-07-01 2022-07-12 Pure Storage, Inc. Offloading device management responsibilities of a storage device to a storage controller
US9910800B1 (en) 2015-08-03 2018-03-06 Pure Storage, Inc. Utilizing remote direct memory access (‘RDMA’) for communication between controllers in a storage array
US11681640B2 (en) 2015-08-03 2023-06-20 Pure Storage, Inc. Multi-channel communications between controllers in a storage system
US9892071B2 (en) 2015-08-03 2018-02-13 Pure Storage, Inc. Emulating a remote direct memory access (‘RDMA’) link between controllers in a storage array
US10540307B1 (en) 2015-08-03 2020-01-21 Pure Storage, Inc. Providing an active/active front end by coupled controllers in a storage system
US9851762B1 (en) 2015-08-06 2017-12-26 Pure Storage, Inc. Compliant printed circuit board (‘PCB’) within an enclosure
US11625181B1 (en) 2015-08-24 2023-04-11 Pure Storage, Inc. Data tiering using snapshots
US11868636B2 (en) 2015-08-24 2024-01-09 Pure Storage, Inc. Prioritizing garbage collection based on the extent to which data is deduplicated
US10198194B2 (en) 2015-08-24 2019-02-05 Pure Storage, Inc. Placing data within a storage device of a flash array
US11294588B1 (en) 2015-08-24 2022-04-05 Pure Storage, Inc. Placing data within a storage device
US10409742B2 (en) 2015-10-07 2019-09-10 Rambus Inc. Interface for memory readout from a memory component in the event of fault
US11308009B2 (en) 2015-10-07 2022-04-19 Rambus Inc. Interface for memory readout from a memory component in the event of fault
US11625346B2 (en) 2015-10-07 2023-04-11 Rambus Inc. Interface for memory readout from a memory component in the event of fault
US11061758B1 (en) 2015-10-23 2021-07-13 Pure Storage, Inc. Proactively providing corrective measures for storage arrays
US10514978B1 (en) 2015-10-23 2019-12-24 Pure Storage, Inc. Automatic deployment of corrective measures for storage arrays
US10599536B1 (en) 2015-10-23 2020-03-24 Pure Storage, Inc. Preventing storage errors using problem signatures
US11593194B2 (en) 2015-10-23 2023-02-28 Pure Storage, Inc. Cloud-based providing of one or more corrective measures for a storage system
US11874733B2 (en) 2015-10-23 2024-01-16 Pure Storage, Inc. Recovering a container storage system
US11360844B1 (en) 2015-10-23 2022-06-14 Pure Storage, Inc. Recovery of a container storage provider
US11934260B2 (en) 2015-10-23 2024-03-19 Pure Storage, Inc. Problem signature-based corrective measure deployment
US10284232B2 (en) 2015-10-28 2019-05-07 Pure Storage, Inc. Dynamic error processing in a storage device
US10432233B1 (en) 2015-10-28 2019-10-01 Pure Storage Inc. Error correction processing in a storage device
US11784667B2 (en) 2015-10-28 2023-10-10 Pure Storage, Inc. Selecting optimal responses to errors in a storage system
US11836357B2 (en) 2015-10-29 2023-12-05 Pure Storage, Inc. Memory aligned copy operation execution
US11422714B1 (en) 2015-10-29 2022-08-23 Pure Storage, Inc. Efficient copying of data in a storage system
US11032123B1 (en) 2015-10-29 2021-06-08 Pure Storage, Inc. Hierarchical storage system management
US10374868B2 (en) 2015-10-29 2019-08-06 Pure Storage, Inc. Distributed command processing in a flash storage system
US10268403B1 (en) 2015-10-29 2019-04-23 Pure Storage, Inc. Combining multiple copy operations into a single copy operation
US10956054B1 (en) 2015-10-29 2021-03-23 Pure Storage, Inc. Efficient performance of copy operations in a storage system
US9740414B2 (en) 2015-10-29 2017-08-22 Pure Storage, Inc. Optimizing copy operations
US10353777B2 (en) 2015-10-30 2019-07-16 Pure Storage, Inc. Ensuring crash-safe forward progress of a system configuration update
US10929231B1 (en) 2015-10-30 2021-02-23 Pure Storage, Inc. System configuration selection in a storage system
US10255176B1 (en) 2015-12-02 2019-04-09 Pure Storage, Inc. Input/output (‘I/O’) in a storage system that includes multiple types of storage devices
US9760479B2 (en) 2015-12-02 2017-09-12 Pure Storage, Inc. Writing data in a storage system that includes a first type of storage device and a second type of storage device
US10970202B1 (en) 2015-12-02 2021-04-06 Pure Storage, Inc. Managing input/output (‘I/O’) requests in a storage system that includes multiple types of storage devices
US11762764B1 (en) 2015-12-02 2023-09-19 Pure Storage, Inc. Writing data in a storage system that includes a first type of storage device and a second type of storage device
US10326836B2 (en) 2015-12-08 2019-06-18 Pure Storage, Inc. Partially replicating a snapshot between storage systems
US10986179B1 (en) 2015-12-08 2021-04-20 Pure Storage, Inc. Cloud-based snapshot replication
US11616834B2 (en) 2015-12-08 2023-03-28 Pure Storage, Inc. Efficient replication of a dataset to the cloud
US10162835B2 (en) 2015-12-15 2018-12-25 Pure Storage, Inc. Proactive management of a plurality of storage arrays in a multi-array system
US11836118B2 (en) 2015-12-15 2023-12-05 Pure Storage, Inc. Performance metric-based improvement of one or more conditions of a storage array
US11030160B1 (en) 2015-12-15 2021-06-08 Pure Storage, Inc. Projecting the effects of implementing various actions on a storage system
US11347697B1 (en) 2015-12-15 2022-05-31 Pure Storage, Inc. Proactively optimizing a storage system
US20170177069A1 (en) * 2015-12-21 2017-06-22 Intel Corporation Smart power adapters and related systems and methods
US10275016B2 (en) * 2015-12-21 2019-04-30 Intel Corporation Smart power adapters and related systems and methods
US11281375B1 (en) 2015-12-28 2022-03-22 Pure Storage, Inc. Optimizing for data reduction in a storage system
US10346043B2 (en) 2015-12-28 2019-07-09 Pure Storage, Inc. Adaptive computing for data compression
US9886314B2 (en) 2016-01-28 2018-02-06 Pure Storage, Inc. Placing workloads in a multi-array system
US10929185B1 (en) 2016-01-28 2021-02-23 Pure Storage, Inc. Predictive workload placement
US11392565B1 (en) 2016-02-11 2022-07-19 Pure Storage, Inc. Optimizing data compression in a storage system
US10572460B2 (en) 2016-02-11 2020-02-25 Pure Storage, Inc. Compressing data in dependence upon characteristics of a storage system
US11748322B2 (en) 2016-02-11 2023-09-05 Pure Storage, Inc. Utilizing different data compression algorithms based on characteristics of a storage system
US11561730B1 (en) 2016-02-12 2023-01-24 Pure Storage, Inc. Selecting paths between a host and a storage system
US10289344B1 (en) 2016-02-12 2019-05-14 Pure Storage, Inc. Bandwidth-based path selection in a storage network
US10884666B1 (en) 2016-02-12 2021-01-05 Pure Storage, Inc. Dynamic path selection in a storage network
US10001951B1 (en) 2016-02-12 2018-06-19 Pure Storage, Inc. Path selection in a data storage system
US9760297B2 (en) 2016-02-12 2017-09-12 Pure Storage, Inc. Managing input/output (‘I/O’) queues in a data storage system
US11340785B1 (en) 2016-03-16 2022-05-24 Pure Storage, Inc. Upgrading data in a storage system using background processes
US9959043B2 (en) 2016-03-16 2018-05-01 Pure Storage, Inc. Performing a non-disruptive upgrade of data in a storage system
US10768815B1 (en) 2016-03-16 2020-09-08 Pure Storage, Inc. Upgrading a storage system
US9841921B2 (en) 2016-04-27 2017-12-12 Pure Storage, Inc. Migrating data in a storage array that includes a plurality of storage devices
US11809727B1 (en) 2016-04-27 2023-11-07 Pure Storage, Inc. Predicting failures in a storage system that includes a plurality of storage devices
US10564884B1 (en) 2016-04-27 2020-02-18 Pure Storage, Inc. Intelligent data migration within a flash storage array
US11934681B2 (en) 2016-04-27 2024-03-19 Pure Storage, Inc. Data migration for write groups
US11112990B1 (en) 2016-04-27 2021-09-07 Pure Storage, Inc. Managing storage device evacuation
US10545676B1 (en) 2016-04-28 2020-01-28 Pure Storage, Inc. Providing high availability to client-specific applications executing in a storage system
US11461009B2 (en) 2016-04-28 2022-10-04 Pure Storage, Inc. Supporting applications across a fleet of storage systems
US9811264B1 (en) 2016-04-28 2017-11-07 Pure Storage, Inc. Deploying client-specific applications in a storage system utilizing redundant system resources
US10996859B1 (en) 2016-04-28 2021-05-04 Pure Storage, Inc. Utilizing redundant resources in a storage system
US10620864B1 (en) 2016-05-02 2020-04-14 Pure Storage, Inc. Improving the accuracy of in-line data deduplication
US10303390B1 (en) 2016-05-02 2019-05-28 Pure Storage, Inc. Resolving fingerprint collisions in flash storage system
US11231858B2 (en) 2016-05-19 2022-01-25 Pure Storage, Inc. Dynamically configuring a storage system to facilitate independent scaling of resources
US10642524B1 (en) 2016-05-20 2020-05-05 Pure Storage, Inc. Upgrading a write buffer in a storage system that includes a plurality of storage devices and a plurality of write buffer devices
US10078469B1 (en) 2016-05-20 2018-09-18 Pure Storage, Inc. Preparing for cache upgrade in a storage array that includes a plurality of storage devices and a plurality of write buffer devices
US9817603B1 (en) 2016-05-20 2017-11-14 Pure Storage, Inc. Data migration in a storage array that includes a plurality of storage devices
US11126516B2 (en) 2016-06-03 2021-09-21 Pure Storage, Inc. Dynamic formation of a failure domain
US10691567B2 (en) 2016-06-03 2020-06-23 Pure Storage, Inc. Dynamically forming a failure domain in a storage system that includes a plurality of blades
US10031571B2 (en) * 2016-07-06 2018-07-24 Dell Products L.P. Systems and methods for power loss protection of storage resources
US10452310B1 (en) 2016-07-13 2019-10-22 Pure Storage, Inc. Validating cabling for storage component admission to a storage array
US11706895B2 (en) 2016-07-19 2023-07-18 Pure Storage, Inc. Independent scaling of compute resources and storage resources in a storage system
US20180024764A1 (en) * 2016-07-22 2018-01-25 Intel Corporation Technologies for accelerating data writes
US10459652B2 (en) 2016-07-27 2019-10-29 Pure Storage, Inc. Evacuating blades in a storage array that includes a plurality of blades
US10474363B1 (en) 2016-07-29 2019-11-12 Pure Storage, Inc. Space reporting in a storage system
US11630585B1 (en) 2016-08-25 2023-04-18 Pure Storage, Inc. Processing evacuation events in a storage array that includes a plurality of storage devices
US11803492B2 (en) 2016-09-07 2023-10-31 Pure Storage, Inc. System resource management using time-independent scheduling
US11921567B2 (en) 2016-09-07 2024-03-05 Pure Storage, Inc. Temporarily preventing access to a storage device
US10908966B1 (en) 2016-09-07 2021-02-02 Pure Storage, Inc. Adapting target service times in a storage system
US11914455B2 (en) 2016-09-07 2024-02-27 Pure Storage, Inc. Addressing storage device performance
US11520720B1 (en) 2016-09-07 2022-12-06 Pure Storage, Inc. Weighted resource allocation for workload scheduling
US10585711B2 (en) 2016-09-07 2020-03-10 Pure Storage, Inc. Crediting entity utilization of system resources
US11531577B1 (en) 2016-09-07 2022-12-20 Pure Storage, Inc. Temporarily limiting access to a storage device
US10534648B2 (en) 2016-09-07 2020-01-14 Pure Storage, Inc. System resource utilization balancing
US10146585B2 (en) 2016-09-07 2018-12-04 Pure Storage, Inc. Ensuring the fair utilization of system resources using workload based, time-independent scheduling
US10896068B1 (en) 2016-09-07 2021-01-19 Pure Storage, Inc. Ensuring the fair utilization of system resources using workload based, time-independent scheduling
US10353743B1 (en) 2016-09-07 2019-07-16 Pure Storage, Inc. System resource utilization balancing in a storage system
US11886922B2 (en) 2016-09-07 2024-01-30 Pure Storage, Inc. Scheduling input/output operations for a storage system
US11449375B1 (en) 2016-09-07 2022-09-20 Pure Storage, Inc. Performing rehabilitative actions on storage devices
US10963326B1 (en) 2016-09-07 2021-03-30 Pure Storage, Inc. Self-healing storage devices
US10671439B1 (en) 2016-09-07 2020-06-02 Pure Storage, Inc. Workload planning with quality-of-service (‘QOS’) integration
US10331588B2 (en) 2016-09-07 2019-06-25 Pure Storage, Inc. Ensuring the appropriate utilization of system resources using weighted workload based, time-independent scheduling
US11481261B1 (en) 2016-09-07 2022-10-25 Pure Storage, Inc. Preventing extended latency in a storage system
US10235229B1 (en) 2016-09-07 2019-03-19 Pure Storage, Inc. Rehabilitating storage devices in a storage array that includes a plurality of storage devices
US11789780B1 (en) 2016-09-07 2023-10-17 Pure Storage, Inc. Preserving quality-of-service (‘QOS’) to storage system workloads
US10853281B1 (en) 2016-09-07 2020-12-01 Pure Storage, Inc. Administration of storage system resource utilization
US11379132B1 (en) 2016-10-20 2022-07-05 Pure Storage, Inc. Correlating medical sensor data
US10007459B2 (en) 2016-10-20 2018-06-26 Pure Storage, Inc. Performance tuning in a storage system that includes one or more storage devices
US10331370B2 (en) 2016-10-20 2019-06-25 Pure Storage, Inc. Tuning a storage system in dependence upon workload access patterns
US11620075B2 (en) 2016-11-22 2023-04-04 Pure Storage, Inc. Providing application aware storage
US10416924B1 (en) 2016-11-22 2019-09-17 Pure Storage, Inc. Identifying workload characteristics in dependence upon storage utilization
US10162566B2 (en) 2016-11-22 2018-12-25 Pure Storage, Inc. Accumulating application-level statistics in a storage system
US11016700B1 (en) 2016-11-22 2021-05-25 Pure Storage, Inc. Analyzing application-specific consumption of storage system resources
US10198205B1 (en) 2016-12-19 2019-02-05 Pure Storage, Inc. Dynamically adjusting a number of storage devices utilized to simultaneously service write operations
US11687259B2 (en) 2016-12-19 2023-06-27 Pure Storage, Inc. Reconfiguring a storage system based on resource availability
US11061573B1 (en) 2016-12-19 2021-07-13 Pure Storage, Inc. Accelerating write operations in a storage system
US11461273B1 (en) 2016-12-20 2022-10-04 Pure Storage, Inc. Modifying storage distribution in a storage system that includes one or more storage devices
US10489307B2 (en) 2017-01-05 2019-11-26 Pure Storage, Inc. Periodically re-encrypting user data stored on a storage device
US10574454B1 (en) 2017-01-05 2020-02-25 Pure Storage, Inc. Current key data encryption
US11146396B1 (en) 2017-01-05 2021-10-12 Pure Storage, Inc. Data re-encryption in a storage system
US11762781B2 (en) 2017-01-09 2023-09-19 Pure Storage, Inc. Providing end-to-end encryption for data stored in a storage system
US10503700B1 (en) 2017-01-19 2019-12-10 Pure Storage, Inc. On-demand content filtering of snapshots within a storage system
US11861185B2 (en) 2017-01-19 2024-01-02 Pure Storage, Inc. Protecting sensitive data in snapshots
US11340800B1 (en) 2017-01-19 2022-05-24 Pure Storage, Inc. Content masking in a storage system
US11163624B2 (en) 2017-01-27 2021-11-02 Pure Storage, Inc. Dynamically adjusting an amount of log data generated for a storage system
US11726850B2 (en) 2017-01-27 2023-08-15 Pure Storage, Inc. Increasing or decreasing the amount of log data generated based on performance characteristics of a device
US11803453B1 (en) 2017-03-10 2023-10-31 Pure Storage, Inc. Using host connectivity states to avoid queuing I/O requests
US11379285B1 (en) 2017-03-10 2022-07-05 Pure Storage, Inc. Mediation for synchronous replication
US11941279B2 (en) 2017-03-10 2024-03-26 Pure Storage, Inc. Data path virtualization
US11500745B1 (en) 2017-03-10 2022-11-15 Pure Storage, Inc. Issuing operations directed to synchronously replicated data
US10990490B1 (en) 2017-03-10 2021-04-27 Pure Storage, Inc. Creating a synchronous replication lease between two or more storage systems
US11645173B2 (en) 2017-03-10 2023-05-09 Pure Storage, Inc. Resilient mediation between storage systems replicating a dataset
US11442825B2 (en) 2017-03-10 2022-09-13 Pure Storage, Inc. Establishing a synchronous replication relationship between two or more storage systems
US11675520B2 (en) 2017-03-10 2023-06-13 Pure Storage, Inc. Application replication among storage systems synchronously replicating a dataset
US11422730B1 (en) 2017-03-10 2022-08-23 Pure Storage, Inc. Recovery for storage systems synchronously replicating a dataset
US11687423B2 (en) 2017-03-10 2023-06-27 Pure Storage, Inc. Prioritizing highly performant storage systems for servicing a synchronously replicated dataset
US11687500B1 (en) 2017-03-10 2023-06-27 Pure Storage, Inc. Updating metadata for a synchronously replicated dataset
US11698844B2 (en) 2017-03-10 2023-07-11 Pure Storage, Inc. Managing storage systems that are synchronously replicating a dataset
US10884993B1 (en) 2017-03-10 2021-01-05 Pure Storage, Inc. Synchronizing metadata among storage systems synchronously replicating a dataset
US11716385B2 (en) 2017-03-10 2023-08-01 Pure Storage, Inc. Utilizing cloud-based storage systems to support synchronous replication of a dataset
US10680932B1 (en) 2017-03-10 2020-06-09 Pure Storage, Inc. Managing connectivity to synchronously replicated storage systems
US11086555B1 (en) 2017-03-10 2021-08-10 Pure Storage, Inc. Synchronously replicating datasets
US11169727B1 (en) 2017-03-10 2021-11-09 Pure Storage, Inc. Synchronous replication between storage systems with virtualized storage
US10671408B1 (en) 2017-03-10 2020-06-02 Pure Storage, Inc. Automatic storage system configuration for mediation services
US11789831B2 (en) 2017-03-10 2023-10-17 Pure Storage, Inc. Directing operations to synchronously replicated storage systems
US11210219B1 (en) 2017-03-10 2021-12-28 Pure Storage, Inc. Synchronously replicating a dataset across a plurality of storage systems
US11797403B2 (en) 2017-03-10 2023-10-24 Pure Storage, Inc. Maintaining a synchronous replication relationship between two or more storage systems
US10613779B1 (en) 2017-03-10 2020-04-07 Pure Storage, Inc. Determining membership among storage systems synchronously replicating a dataset
US11829629B2 (en) 2017-03-10 2023-11-28 Pure Storage, Inc. Synchronously replicating data using virtual volumes
US11347606B2 (en) 2017-03-10 2022-05-31 Pure Storage, Inc. Responding to a change in membership among storage systems synchronously replicating a dataset
US10585733B1 (en) 2017-03-10 2020-03-10 Pure Storage, Inc. Determining active membership among storage systems synchronously replicating a dataset
US10558537B1 (en) 2017-03-10 2020-02-11 Pure Storage, Inc. Mediating between storage systems synchronously replicating a dataset
US11237927B1 (en) 2017-03-10 2022-02-01 Pure Storage, Inc. Resolving disruptions between storage systems replicating a dataset
US10454810B1 (en) 2017-03-10 2019-10-22 Pure Storage, Inc. Managing host definitions across a plurality of storage systems
US10365982B1 (en) 2017-03-10 2019-07-30 Pure Storage, Inc. Establishing a synchronous replication relationship between two or more storage systems
US10521344B1 (en) 2017-03-10 2019-12-31 Pure Storage, Inc. Servicing input/output (‘I/O’) operations directed to a dataset that is synchronized across a plurality of storage systems
US10503427B2 (en) 2017-03-10 2019-12-10 Pure Storage, Inc. Synchronously replicating datasets and other managed objects to cloud-based storage systems
US10552050B1 (en) 2017-04-07 2020-02-04 Bitmicro Llc Multi-dimensional computer storage system
US10459664B1 (en) 2017-04-10 2019-10-29 Pure Storage, Inc. Virtualized copy-by-reference
US10534677B2 (en) 2017-04-10 2020-01-14 Pure Storage, Inc. Providing high availability for applications executing on a storage system
US11656804B2 (en) 2017-04-10 2023-05-23 Pure Storage, Inc. Copy using metadata representation
US9910618B1 (en) 2017-04-10 2018-03-06 Pure Storage, Inc. Migrating applications executing on a storage system
US11126381B1 (en) 2017-04-10 2021-09-21 Pure Storage, Inc. Lightweight copy
US11868629B1 (en) 2017-05-05 2024-01-09 Pure Storage, Inc. Storage system sizing service
US10146460B1 (en) 2017-06-01 2018-12-04 Apple Inc. Programming schemes for avoidance or recovery from cross-temperature read failures
US9928126B1 (en) 2017-06-01 2018-03-27 Apple Inc. Recovery from cross-temperature read failures by programming neighbor word lines
US11210133B1 (en) 2017-06-12 2021-12-28 Pure Storage, Inc. Workload mobility between disparate execution environments
US10613791B2 (en) 2017-06-12 2020-04-07 Pure Storage, Inc. Portable snapshot replication between storage systems
US11016824B1 (en) 2017-06-12 2021-05-25 Pure Storage, Inc. Event identification with out-of-order reporting in a cloud-based environment
US10789020B2 (en) 2017-06-12 2020-09-29 Pure Storage, Inc. Recovering data within a unified storage element
US11422731B1 (en) 2017-06-12 2022-08-23 Pure Storage, Inc. Metadata-based replication of a dataset
US11567810B1 (en) 2017-06-12 2023-01-31 Pure Storage, Inc. Cost optimized workload placement
US10884636B1 (en) 2017-06-12 2021-01-05 Pure Storage, Inc. Presenting workload performance in a storage system
US11609718B1 (en) 2017-06-12 2023-03-21 Pure Storage, Inc. Identifying valid data after a storage system recovery
US10853148B1 (en) 2017-06-12 2020-12-01 Pure Storage, Inc. Migrating workloads between a plurality of execution environments
US11340939B1 (en) 2017-06-12 2022-05-24 Pure Storage, Inc. Application-aware analytics for storage systems
US11593036B2 (en) 2017-06-12 2023-02-28 Pure Storage, Inc. Staging data within a unified storage element
US11561714B1 (en) 2017-07-05 2023-01-24 Pure Storage, Inc. Storage efficiency driven migration
US11477280B1 (en) 2017-07-26 2022-10-18 Pure Storage, Inc. Integrating cloud storage services
US11921908B2 (en) 2017-08-31 2024-03-05 Pure Storage, Inc. Writing data to compressed and encrypted volumes
US10552090B2 (en) 2017-09-07 2020-02-04 Pure Storage, Inc. Solid state drives with multiple types of addressable memory
US11714718B2 (en) 2017-09-07 2023-08-01 Pure Storage, Inc. Performing partial redundant array of independent disks (RAID) stripe parity calculations
US11392456B1 (en) 2017-09-07 2022-07-19 Pure Storage, Inc. Calculating parity as a data stripe is modified
US10417092B2 (en) 2017-09-07 2019-09-17 Pure Storage, Inc. Incremental RAID stripe update parity calculation
US10891192B1 (en) 2017-09-07 2021-01-12 Pure Storage, Inc. Updating raid stripe parity calculations
US11592991B2 (en) 2017-09-07 2023-02-28 Pure Storage, Inc. Converting raid data between persistent storage types
US10671434B1 (en) 2017-10-19 2020-06-02 Pure Storage, Inc. Storage based artificial intelligence infrastructure
US10671435B1 (en) 2017-10-19 2020-06-02 Pure Storage, Inc. Data transformation caching in an artificial intelligence infrastructure
US11403290B1 (en) 2017-10-19 2022-08-02 Pure Storage, Inc. Managing an artificial intelligence infrastructure
US10649988B1 (en) 2017-10-19 2020-05-12 Pure Storage, Inc. Artificial intelligence and machine learning infrastructure
US10452444B1 (en) 2017-10-19 2019-10-22 Pure Storage, Inc. Storage system with compute resources and shared storage resources
US11307894B1 (en) 2017-10-19 2022-04-19 Pure Storage, Inc. Executing a big data analytics pipeline using shared storage resources
US11210140B1 (en) 2017-10-19 2021-12-28 Pure Storage, Inc. Data transformation delegation for a graphical processing unit (‘GPU’) server
US10275176B1 (en) 2017-10-19 2019-04-30 Pure Storage, Inc. Data transformation offloading in an artificial intelligence infrastructure
US11768636B2 (en) 2017-10-19 2023-09-26 Pure Storage, Inc. Generating a transformed dataset for use by a machine learning model in an artificial intelligence infrastructure
US11861423B1 (en) 2017-10-19 2024-01-02 Pure Storage, Inc. Accelerating artificial intelligence (‘AI’) workflows
US10360214B2 (en) 2017-10-19 2019-07-23 Pure Storage, Inc. Ensuring reproducibility in an artificial intelligence infrastructure
US11803338B2 (en) 2017-10-19 2023-10-31 Pure Storage, Inc. Executing a machine learning model in an artificial intelligence infrastructure
US11556280B2 (en) 2017-10-19 2023-01-17 Pure Storage, Inc. Data transformation for a machine learning model
US11455168B1 (en) 2017-10-19 2022-09-27 Pure Storage, Inc. Batch building for deep learning training workloads
US10275285B1 (en) 2017-10-19 2019-04-30 Pure Storage, Inc. Data transformation caching in an artificial intelligence infrastructure
US10817392B1 (en) 2017-11-01 2020-10-27 Pure Storage, Inc. Ensuring resiliency to storage device failures in a storage system that includes a plurality of storage devices
US10671494B1 (en) 2017-11-01 2020-06-02 Pure Storage, Inc. Consistent selection of replicated datasets during storage system recovery
US11451391B1 (en) 2017-11-01 2022-09-20 Pure Storage, Inc. Encryption key management in a storage system
US11263096B1 (en) 2017-11-01 2022-03-01 Pure Storage, Inc. Preserving tolerance to storage device failures in a storage system
US10509581B1 (en) 2017-11-01 2019-12-17 Pure Storage, Inc. Maintaining write consistency in a multi-threaded storage system
US10467107B1 (en) 2017-11-01 2019-11-05 Pure Storage, Inc. Maintaining metadata resiliency among storage device failures
US11663097B2 (en) 2017-11-01 2023-05-30 Pure Storage, Inc. Mirroring data to survive storage device failures
US10484174B1 (en) 2017-11-01 2019-11-19 Pure Storage, Inc. Protecting an encryption key for data stored in a storage system that includes a plurality of storage devices
WO2019092497A1 (en) * 2017-11-13 2019-05-16 Weka. Io Ltd. Methods and systems for power failure resistance for a distributed storage system
US11561860B2 (en) 2017-11-13 2023-01-24 Weka.IO Ltd. Methods and systems for power failure resistance for a distributed storage system
US11847025B2 (en) 2017-11-21 2023-12-19 Pure Storage, Inc. Storage system parity based on system characteristics
US11500724B1 (en) 2017-11-21 2022-11-15 Pure Storage, Inc. Flexible parity information for storage systems
US10929226B1 (en) 2017-11-21 2021-02-23 Pure Storage, Inc. Providing for increased flexibility for large scale parity
US10936238B2 (en) 2017-11-28 2021-03-02 Pure Storage, Inc. Hybrid data tiering
US11604583B2 (en) 2017-11-28 2023-03-14 Pure Storage, Inc. Policy based data tiering
US10990282B1 (en) 2017-11-28 2021-04-27 Pure Storage, Inc. Hybrid data tiering with cloud storage
US11579790B1 (en) 2017-12-07 2023-02-14 Pure Storage, Inc. Servicing input/output (‘I/O’) operations during data migration
US10795598B1 (en) 2017-12-07 2020-10-06 Pure Storage, Inc. Volume migration for storage systems synchronously replicating a dataset
US11089105B1 (en) 2017-12-14 2021-08-10 Pure Storage, Inc. Synchronously replicating datasets in cloud-based storage systems
US11036677B1 (en) 2017-12-14 2021-06-15 Pure Storage, Inc. Replicated data integrity
US11782614B1 (en) 2017-12-21 2023-10-10 Pure Storage, Inc. Encrypting data to optimize data reduction
US10992533B1 (en) 2018-01-30 2021-04-27 Pure Storage, Inc. Policy based path management
US11296944B2 (en) 2018-01-30 2022-04-05 Pure Storage, Inc. Updating path selection as paths between a computing device and a storage system change
US11150834B1 (en) 2018-03-05 2021-10-19 Pure Storage, Inc. Determining storage consumption in a storage system
US10942650B1 (en) 2018-03-05 2021-03-09 Pure Storage, Inc. Reporting capacity utilization in a storage system
US10521151B1 (en) 2018-03-05 2019-12-31 Pure Storage, Inc. Determining effective space utilization in a storage system
US11614881B2 (en) 2018-03-05 2023-03-28 Pure Storage, Inc. Calculating storage consumption for distinct client entities
US11836349B2 (en) 2018-03-05 2023-12-05 Pure Storage, Inc. Determining storage capacity utilization based on deduplicated data
US11474701B1 (en) 2018-03-05 2022-10-18 Pure Storage, Inc. Determining capacity consumption in a deduplicating storage system
US11861170B2 (en) 2018-03-05 2024-01-02 Pure Storage, Inc. Sizing resources for a replication target
US10296258B1 (en) 2018-03-09 2019-05-21 Pure Storage, Inc. Offloading data storage to a decentralized storage network
US11112989B2 (en) 2018-03-09 2021-09-07 Pure Storage, Inc. Utilizing a decentralized storage network for data storage
US11838359B2 (en) 2018-03-15 2023-12-05 Pure Storage, Inc. Synchronizing metadata in a cloud-based storage system
US11704202B2 (en) 2018-03-15 2023-07-18 Pure Storage, Inc. Recovering from system faults for replicated datasets
US11288138B1 (en) 2018-03-15 2022-03-29 Pure Storage, Inc. Recovery from a system fault in a cloud-based storage system
US11539793B1 (en) 2018-03-15 2022-12-27 Pure Storage, Inc. Responding to membership changes to a set of storage systems that are synchronously replicating a dataset
US11533364B1 (en) 2018-03-15 2022-12-20 Pure Storage, Inc. Maintaining metadata associated with a replicated dataset
US11048590B1 (en) 2018-03-15 2021-06-29 Pure Storage, Inc. Data consistency during recovery in a cloud-based storage system
US11210009B1 (en) 2018-03-15 2021-12-28 Pure Storage, Inc. Staging data in a cloud-based storage system
US10976962B2 (en) 2018-03-15 2021-04-13 Pure Storage, Inc. Servicing I/O operations in a cloud-based storage system
US10924548B1 (en) 2018-03-15 2021-02-16 Pure Storage, Inc. Symmetric storage using a cloud-based storage system
US11442669B1 (en) 2018-03-15 2022-09-13 Pure Storage, Inc. Orchestrating a virtual storage system
US10917471B1 (en) 2018-03-15 2021-02-09 Pure Storage, Inc. Active membership in a cloud-based storage system
US11698837B2 (en) 2018-03-15 2023-07-11 Pure Storage, Inc. Consistent recovery of a dataset
US11888846B2 (en) 2018-03-21 2024-01-30 Pure Storage, Inc. Configuring storage systems in a fleet of storage systems
US11729251B2 (en) 2018-03-21 2023-08-15 Pure Storage, Inc. Remote and secure management of a storage system
US11095706B1 (en) 2018-03-21 2021-08-17 Pure Storage, Inc. Secure cloud-based storage system management
US11171950B1 (en) 2018-03-21 2021-11-09 Pure Storage, Inc. Secure cloud-based storage system management
US11714728B2 (en) 2018-03-26 2023-08-01 Pure Storage, Inc. Creating a highly available data analytics pipeline without replicas
US11494692B1 (en) 2018-03-26 2022-11-08 Pure Storage, Inc. Hyperscale artificial intelligence and machine learning infrastructure
US11263095B1 (en) 2018-03-26 2022-03-01 Pure Storage, Inc. Managing a data analytics pipeline
US10838833B1 (en) 2018-03-26 2020-11-17 Pure Storage, Inc. Providing for high availability in a data analytics pipeline without replicas
US11392553B1 (en) 2018-04-24 2022-07-19 Pure Storage, Inc. Remote data management
US11436344B1 (en) 2018-04-24 2022-09-06 Pure Storage, Inc. Secure encryption in deduplication cluster
US11677687B2 (en) 2018-05-21 2023-06-13 Pure Storage, Inc. Switching between fault response models in a storage system
US11455409B2 (en) 2018-05-21 2022-09-27 Pure Storage, Inc. Storage layer data obfuscation
US11128578B2 (en) 2018-05-21 2021-09-21 Pure Storage, Inc. Switching between mediator services for a storage system
US11757795B2 (en) 2018-05-21 2023-09-12 Pure Storage, Inc. Resolving mediator unavailability
US11675503B1 (en) 2018-05-21 2023-06-13 Pure Storage, Inc. Role-based data access
US10992598B2 (en) 2018-05-21 2021-04-27 Pure Storage, Inc. Synchronously replicating when a mediation service becomes unavailable
US11748030B1 (en) 2018-05-22 2023-09-05 Pure Storage, Inc. Storage system metric optimization for container orchestrators
US10871922B2 (en) 2018-05-22 2020-12-22 Pure Storage, Inc. Integrated storage management between storage systems and container orchestrators
US11403000B1 (en) 2018-07-20 2022-08-02 Pure Storage, Inc. Resiliency in a cloud-based storage system
US11416298B1 (en) 2018-07-20 2022-08-16 Pure Storage, Inc. Providing application-specific storage by a storage system
US11146564B1 (en) 2018-07-24 2021-10-12 Pure Storage, Inc. Login authentication in a cloud storage platform
US11632360B1 (en) 2018-07-24 2023-04-18 Pure Storage, Inc. Remote access to a storage device
US20220214954A1 (en) * 2018-09-07 2022-07-07 Phoenix Contact Gmbh & Co. Kg Electronic device for use in an automation system, and an automation system
US11860820B1 (en) 2018-09-11 2024-01-02 Pure Storage, Inc. Processing data through a storage system in a data pipeline
US11586365B2 (en) 2018-10-26 2023-02-21 Pure Storage, Inc. Applying a rate limit across a plurality of storage systems
US10671302B1 (en) 2018-10-26 2020-06-02 Pure Storage, Inc. Applying a rate limit across a plurality of storage systems
US10990306B1 (en) 2018-10-26 2021-04-27 Pure Storage, Inc. Bandwidth sharing for paired storage systems
US11907590B2 (en) 2018-11-18 2024-02-20 Pure Storage, Inc. Using infrastructure-as-code (‘IaC’) to update a cloud-based storage system
US10963189B1 (en) 2018-11-18 2021-03-30 Pure Storage, Inc. Coalescing write operations in a cloud-based storage system
US11526405B1 (en) 2018-11-18 2022-12-13 Pure Storage, Inc. Cloud-based disaster recovery
US11768635B2 (en) 2018-11-18 2023-09-26 Pure Storage, Inc. Scaling storage resources in a storage volume
US11379254B1 (en) 2018-11-18 2022-07-05 Pure Storage, Inc. Dynamic configuration of a cloud-based storage system
US11928366B2 (en) 2018-11-18 2024-03-12 Pure Storage, Inc. Scaling a cloud-based storage system in response to a change in workload
US11455126B1 (en) 2018-11-18 2022-09-27 Pure Storage, Inc. Copying a cloud-based storage system
US10917470B1 (en) 2018-11-18 2021-02-09 Pure Storage, Inc. Cloning storage systems in a cloud computing environment
US11822825B2 (en) 2018-11-18 2023-11-21 Pure Storage, Inc. Distributed cloud-based storage system
US11184233B1 (en) 2018-11-18 2021-11-23 Pure Storage, Inc. Non-disruptive upgrades to a cloud-based storage system
US11023179B2 (en) 2018-11-18 2021-06-01 Pure Storage, Inc. Cloud-based storage system storage management
US11340837B1 (en) 2018-11-18 2022-05-24 Pure Storage, Inc. Storage system management via a remote console
US11941288B1 (en) 2018-11-18 2024-03-26 Pure Storage, Inc. Servicing write operations in a cloud-based storage system
US11861235B2 (en) 2018-11-18 2024-01-02 Pure Storage, Inc. Maximizing data throughput in a cloud-based storage system
US11650749B1 (en) 2018-12-17 2023-05-16 Pure Storage, Inc. Controlling access to sensitive data in a shared dataset
US11947815B2 (en) 2019-01-14 2024-04-02 Pure Storage, Inc. Configuring a flash-based storage device
US11003369B1 (en) 2019-01-14 2021-05-11 Pure Storage, Inc. Performing a tune-up procedure on a storage device during a boot process
US11042452B1 (en) 2019-03-20 2021-06-22 Pure Storage, Inc. Storage system data recovery using data recovery as a service
US11221778B1 (en) 2019-04-02 2022-01-11 Pure Storage, Inc. Preparing data for deduplication
US11068162B1 (en) 2019-04-09 2021-07-20 Pure Storage, Inc. Storage management in a cloud data store
US11640239B2 (en) 2019-04-09 2023-05-02 Pure Storage, Inc. Cost conscious garbage collection
US11392555B2 (en) 2019-05-15 2022-07-19 Pure Storage, Inc. Cloud-based file services
US11853266B2 (en) 2019-05-15 2023-12-26 Pure Storage, Inc. Providing a file system in a cloud environment
US11861221B1 (en) 2019-07-18 2024-01-02 Pure Storage, Inc. Providing scalable and reliable container-based storage services
US11797197B1 (en) 2019-07-18 2023-10-24 Pure Storage, Inc. Dynamic scaling of a virtual storage system
US11327676B1 (en) 2019-07-18 2022-05-10 Pure Storage, Inc. Predictive data streaming in a virtual storage system
US11550514B2 (en) 2019-07-18 2023-01-10 Pure Storage, Inc. Efficient transfers between tiers of a virtual storage system
US11093139B1 (en) 2019-07-18 2021-08-17 Pure Storage, Inc. Durably storing data within a virtual storage system
US11526408B2 (en) 2019-07-18 2022-12-13 Pure Storage, Inc. Data recovery in a virtual storage system
US11126364B2 (en) 2019-07-18 2021-09-21 Pure Storage, Inc. Virtual storage system architecture
US11487715B1 (en) 2019-07-18 2022-11-01 Pure Storage, Inc. Resiliency in a cloud-based storage system
US11086553B1 (en) 2019-08-28 2021-08-10 Pure Storage, Inc. Tiering duplicated objects in a cloud-based object store
US11693713B1 (en) 2019-09-04 2023-07-04 Pure Storage, Inc. Self-tuning clusters for resilient microservices
US11797569B2 (en) 2019-09-13 2023-10-24 Pure Storage, Inc. Configurable data replication
US11360689B1 (en) 2019-09-13 2022-06-14 Pure Storage, Inc. Cloning a tracking copy of replica data
US11704044B2 (en) 2019-09-13 2023-07-18 Pure Storage, Inc. Modifying a cloned image of replica data
US11625416B1 (en) 2019-09-13 2023-04-11 Pure Storage, Inc. Uniform model for distinct types of data replication
US11573864B1 (en) 2019-09-16 2023-02-07 Pure Storage, Inc. Automating database management in a storage system
US11669386B1 (en) 2019-10-08 2023-06-06 Pure Storage, Inc. Managing an application's resource stack
US11947683B2 (en) 2019-12-06 2024-04-02 Pure Storage, Inc. Replicating a storage system
US11531487B1 (en) 2019-12-06 2022-12-20 Pure Storage, Inc. Creating a replica of a storage system
US11930112B1 (en) 2019-12-06 2024-03-12 Pure Storage, Inc. Multi-path end-to-end encryption in a storage system
US11943293B1 (en) 2019-12-06 2024-03-26 Pure Storage, Inc. Restoring a storage system from a replication target
US11868318B1 (en) 2019-12-06 2024-01-09 Pure Storage, Inc. End-to-end encryption in a storage system with multi-tenancy
US11709636B1 (en) 2020-01-13 2023-07-25 Pure Storage, Inc. Non-sequential readahead for deep learning training
US11720497B1 (en) 2020-01-13 2023-08-08 Pure Storage, Inc. Inferred nonsequential prefetch based on data access patterns
US11733901B1 (en) 2020-01-13 2023-08-22 Pure Storage, Inc. Providing persistent storage to transient cloud computing services
US11637896B1 (en) 2020-02-25 2023-04-25 Pure Storage, Inc. Migrating applications to a cloud-computing environment
US11868622B2 (en) 2020-02-25 2024-01-09 Pure Storage, Inc. Application recovery across storage systems
CN113342557B (en) * 2020-03-03 2023-09-15 慧荣科技股份有限公司 Flash memory data fault detection method and computer readable storage medium
CN113342557A (en) * 2020-03-03 2021-09-03 慧荣科技股份有限公司 Flash memory data fault detection method and computer readable storage medium
US11625185B2 (en) 2020-03-25 2023-04-11 Pure Storage, Inc. Transitioning between replication sources for data replication operations
US11321006B1 (en) 2020-03-25 2022-05-03 Pure Storage, Inc. Data loss prevention during transitions from a replication source
US11301152B1 (en) 2020-04-06 2022-04-12 Pure Storage, Inc. Intelligently moving data between storage systems
US11630598B1 (en) 2020-04-06 2023-04-18 Pure Storage, Inc. Scheduling data replication operations
US11853164B2 (en) 2020-04-14 2023-12-26 Pure Storage, Inc. Generating recovery information using data redundancy
US11494267B2 (en) 2020-04-14 2022-11-08 Pure Storage, Inc. Continuous value data redundancy
US11921670B1 (en) 2020-04-20 2024-03-05 Pure Storage, Inc. Multivariate data backup retention policies
CN111625389A (en) * 2020-05-28 2020-09-04 山东海量信息技术研究院 VR fault data acquisition method and device and related components
CN111625389B (en) * 2020-05-28 2024-01-19 山东海量信息技术研究院 VR fault data acquisition method and device and related components
US11954002B1 (en) 2020-05-29 2024-04-09 Pure Storage, Inc. Automatically provisioning mediation services for a storage system
US11431488B1 (en) 2020-06-08 2022-08-30 Pure Storage, Inc. Protecting local key generation using a remote key management service
US11442652B1 (en) 2020-07-23 2022-09-13 Pure Storage, Inc. Replication handling during storage system transportation
US11349917B2 (en) 2020-07-23 2022-05-31 Pure Storage, Inc. Replication handling among distinct networks
US11789638B2 (en) 2020-07-23 2023-10-17 Pure Storage, Inc. Continuing replication during storage system transportation
US11882179B2 (en) 2020-07-23 2024-01-23 Pure Storage, Inc. Supporting multiple replication schemes across distinct network layers
US11954238B1 (en) 2020-10-28 2024-04-09 Pure Storage, Inc. Role-based access control for a storage system
US11693604B2 (en) 2021-01-20 2023-07-04 Pure Storage, Inc. Administering storage access in a cloud-based storage system
US11397545B1 (en) 2021-01-20 2022-07-26 Pure Storage, Inc. Emulating persistent reservations in a cloud-based storage system
US11853285B1 (en) 2021-01-22 2023-12-26 Pure Storage, Inc. Blockchain logging of volume-level events in a storage system
US11763895B2 (en) * 2021-02-05 2023-09-19 Micron Technology, Inc. Power architecture for non-volatile memory
US20230017388A1 (en) * 2021-02-05 2023-01-19 Micron Technology, Inc. Power architecture for non-volatile memory
US11556416B2 (en) 2021-05-05 2023-01-17 Apple Inc. Controlling memory readout reliability and throughput by adjusting distance between read thresholds
US11822809B2 (en) 2021-05-12 2023-11-21 Pure Storage, Inc. Role enforcement for storage-as-a-service
US11588716B2 (en) 2021-05-12 2023-02-21 Pure Storage, Inc. Adaptive storage processing for storage-as-a-service
US11816129B2 (en) 2021-06-22 2023-11-14 Pure Storage, Inc. Generating datasets using approximate baselines
US11586266B1 (en) 2021-07-28 2023-02-21 International Business Machines Corporation Persistent power enabled on-chip data processor
US11847342B2 (en) 2021-07-28 2023-12-19 Apple Inc. Efficient transfer of hard data and confidence levels in reading a nonvolatile memory
US11893263B2 (en) 2021-10-29 2024-02-06 Pure Storage, Inc. Coordinated checkpoints among storage systems implementing checkpoint-based replication
US11914867B2 (en) 2021-10-29 2024-02-27 Pure Storage, Inc. Coordinated snapshots among storage systems implementing a promotion/demotion model
US11714723B2 (en) 2021-10-29 2023-08-01 Pure Storage, Inc. Coordinated snapshots for data stored across distinct storage environments
US11922052B2 (en) 2021-12-15 2024-03-05 Pure Storage, Inc. Managing links between storage objects
US11847071B2 (en) 2021-12-30 2023-12-19 Pure Storage, Inc. Enabling communication between a single-port device and multiple storage system controllers
US11954220B2 (en) 2022-01-19 2024-04-09 Pure Storage, Inc. Data protection for container storage
US11860780B2 (en) 2022-01-28 2024-01-02 Pure Storage, Inc. Storage cache management
US11886295B2 (en) 2022-01-31 2024-01-30 Pure Storage, Inc. Intra-block error correction

Similar Documents

Publication Publication Date Title
US5799200A (en) Power failure responsive apparatus and method having a shadow dram, a flash ROM, an auxiliary battery, and a controller
US6336174B1 (en) Hardware assisted memory backup system and method
US6557077B1 (en) Transportable memory apparatus and associated methods of initializing a computer system having the same
US4959774A (en) Shadow memory system for storing variable backup blocks in consecutive time periods
US5938764A (en) Apparatus for improved storage of computer system configuration information
US5535399A (en) Solid state disk drive unit having on-board backup non-volatile memory
US6463550B1 (en) Computer system implementing fault detection and isolation using unique identification codes stored in non-volatile memory
US6438687B2 (en) Method and apparatus for improved storage of computer system configuration information
US7421552B2 (en) Techniques for managing data within a data storage system utilizing a flash-based memory vault
US6990603B2 (en) Method and apparatus for securing volatile data in power failure in systems having redundancy
US6496945B2 (en) Computer system implementing fault detection and isolation using unique identification codes stored in non-volatile memory
US7774646B2 (en) Surviving storage system takeover by replaying operations in an operations log mirror
US5829019A (en) Computer network server backup with posted write cache disk controllers
US20130142001A1 (en) Battery-less cache memory module with integrated backup
EP0116344B1 (en) Power backed-up dual memory system
US5109505A (en) Semiconductor memory disk apparatus with backup device capable of being accessed immediately after power source is recovered
US6438647B1 (en) Method and apparatus for providing battery-backed immediate write back cache for an array of disk drives in a computer system
KR20170124952A (en) Host memory protection via powered persistent store
US7024571B1 (en) Conversion card and method to convert a general purpose personal computer into a dedicated mass storage appliance
CN110765032A (en) Method for reading and writing I2C memory based on system management bus interface
US6081892A (en) Initial program load
US20090089514A1 (en) Implementing Asynchronous Request for Forcing Dynamic Memory into Self Refresh
EP0167322A2 (en) Shadow memory system
CA2072728A1 (en) Dual data buffering in separately powered memory modules
US20030051193A1 (en) Computer system with improved error detection

Legal Events

Date Code Title Description
AS Assignment

Owner name: EMC CORPORATION, MASSACHUSETTS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BRANT, WILLIAM A.;NIELSON, MICHAEL E.;TANG, EDDE TIU-SHEK;REEL/FRAME:007699/0156

Effective date: 19950927

STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12